Sciweavers

3089 search results - page 596 / 618
» services 2008
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 8 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
EDBT
2008
ACM
166views Database» more  EDBT 2008»
14 years 8 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 8 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
EDBT
2008
ACM
171views Database» more  EDBT 2008»
14 years 8 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack
ICFP
2008
ACM
14 years 8 months ago
Flask: staged functional programming for sensor networks
Severely resource-constrained devices present a confounding challenge to the functional programmer: we are used to having powerful ion facilities at our fingertips, but how can we...
Geoffrey Mainland, Greg Morrisett, Matt Welsh