Filters








74,475 Hits in 10.3 sec

Computation & communication in R

Bruce G. Lindsay, Laura M. Haas, Paul F. Wilms, Robert A. Yost
1983 Proceedings of the ninth ACM symposium on Operating systems principles - SOSP '83  
EXTENDED ABSTRACT R* is an experimental prototype distributed database management system.  ...  The computation needed to perform a sequence of multisite user transactions in R* is structured as a tree of processes communicating over virtual circuit communication links.  ...  to support the execution of a distributed database management system.  ... 
doi:10.1145/800217.806608 dblp:conf/sosp/LindsayHMWY83 fatcat:hmlkv467i5dgjkws3yl23wsohu

Verifying a Distributed Database Lookup Manager Written in Erlang [chapter]

Thomas Arts, Mads Dam
1999 Lecture Notes in Computer Science  
We describe a case-study in which formal methods were used to verify an important responsiveness property of a distributed database system which is used heavily at Ericsson in a number of recent products  ...  The database lookup manager considered here contains most of these features, giving rise to infinite state behaviour which is not very adequately handled using model checking or other approaches based  ...  Acknowledgements Hans Nilsson deserves our special thanks for bringing forward the verification problem we considered in this paper and for the time he spent in explaining us the details.  ... 
doi:10.1007/3-540-48119-2_38 fatcat:7h3a77onfjfathwzb64b6xd5ua

Federated database systems for managing distributed, heterogeneous, and autonomous databases

Amit P. Sheth, James A. Larson
1990 ACM Computing Surveys  
In this paper, we define a reference architecture for distributed database management systems from system and schema viewpoints and show how various FDBS architectures can be developed.  ...  A federated database system (FDBS) is a collection of cooperating database systems that are autonomous and possibly heterogeneous.  ...  Views and security in distributed database management systems. In Proceedings of the International Conference on Extending Database Technology (Venice, Italy, Mar.). In Computer Science.  ... 
doi:10.1145/96602.96604 fatcat:xwgldmynbvg6zcew27tbjeztje

Security constraint processing in a multilevel secure distributed database management system

B. Thuraisingham, W. Ford
1995 IEEE Transactions on Knowledge and Data Engineering  
In our examples, we assume that the database consists of two relations, TANKS and ASSIGNMENT.  ...  In other words, aggregate constraints classify collections of tuples taken together at a level higher than the individual levels of the tuples in the collection.  ...  We are grateful to Marie Collins (of MITRE) for her contributions to constraint processing during update operation which we have extended to a distributed environment.  ... 
doi:10.1109/69.382297 fatcat:i73hx2fmibfxtf4flod55gwzqe

DRACON: QoS Management for Large-Scale Distributed Real-Time Databases

Woochul Kang, Sang H. Son, John A. Stankovic
2009 Journal of Software  
., “Perdis: Design, implementation, and use of a persistent distributed store,” in Advances in Distributed Systems, Advanced Distributed Computing: From Algo- rithms to Systems.  ...  A. Stankovic, and K. D. Kang, “Qos management in replicated real time databases,” in RTSS into a higher level of cluster.  ... 
doi:10.4304/jsw.4.7.747-757 fatcat:5yua457slfcgznryqc2n54ffta

Epidemic algorithms in replicated databases (extended abstract)

D. Agrawal, A. El Abbadi, R. C. Steinke
1997 Proceedings of the sixteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems - PODS '97  
The fist algorithm in this family is a /  ...  Introduction We present a family of epidemic algorithms for maintaining replicated data in a transactional framework.  ...  In general, database specific operations are executed locally and they are communicated to the other database sites by using the epidemic model of communication.  ... 
doi:10.1145/263661.263680 dblp:conf/pods/AgrawalAS97 fatcat:zciqii3e4bd2bclrpaa4smrnqy

Extended Abstracts

2010 Cartilage  
Nutraceuticals in the treatment of OA J.  ...  Acknowledgments: We acknowledge the EU for financial support ("STEPS"; FP6-#NMP3-CT-2005-500465) Acknowledgments: This study was supported by a grant from the New Energy and Industrial Technology Development  ...  2007 extended ICRS abstract on the topic.1 The term applies to resurfacing either one unicompartmental knee replacement since the 2007 extended ICRS 22s 22s Extended Abstracts 16.1.1 16.1.1 Biologic  ... 
doi:10.1177/1947603510386038 pmid:26075041 pmcid:PMC4300817 fatcat:m2mv3tnf6vhzndubvwdtltkh5y

Adaptable Processes (Extended Abstract) [chapter]

Mario Bravetti, Cinzia Di Giusto, Jorge A. Pérez, Gianluigi Zavattaro
2011 Lecture Notes in Computer Science  
While the former ensures that at most k consecutive errors will arise in future states, the latter ensures that if the system enters into an error state then it will eventually reach a correct state.  ...  We study the (un)decidability of these two problems in different fragments of the calculus.  ...  A workflow can be seen as a container of activities; such activities are usually defined in terms of simpler ones, and may be software-based (such as, e.g., "retrieve credit information from the database  ... 
doi:10.1007/978-3-642-21461-5_6 fatcat:rmuiuyb5vrdlbodnkaztz3x6dm

Challenges of Future R&D in Mobile Communications

Dr. Anwar
2012 International Journal of Advanced Computer Science and Applications  
This paper provides a survey for the main challenges of future research and development (R&D) for next generation mobile networks (NGNs).  ...  Direct device-to-device communication, global coverage using satellites and high-altitude platforms are presented as possible evolution paths for space roaming and extending NGN' radio-access.  ...  distributed games played among passengers in neighboring vehicles.  ... 
doi:10.14569/ijacsa.2012.031001 fatcat:uajxj2qfqjhlhmkizsfh3oi4xa

Workshop

Michael J. Muller, David R. Millen
2002 CHI '02 extended abstracts on Human factors in computer systems - CHI '02  
conventions, roles, and identities in the community.  ...  less tangible conventions, roles, and identities in the community.  ...  Managing the virtual commons: Cooperation and conflict in computer communi- ties. In Proceedings of Computer-Mediated Communication. Amsterdam: John Benjamins.  ... 
doi:10.1145/506650.506651 fatcat:jwmese4dvfhcrfyx7tdqyn33va

How to withstand mobile virus attacks (extended abstract)

Rafail Ostrovsky, Moti Yung
1991 Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91  
We initiate a study of distributed adversarial model of computation in which faults are non-stationary and can move through the net work, analogous to a spread of a virus or a worm.  ...  We show how local computations (at each processor) and global computations can be polynomial factor-redundancy in the  ...  Adelman Abstract Theory of Computer Viruses CRYPTO 88. Secure Computation in Constant Rounds PODC 1989, ACM. Beaver D., S. Micali and P.  ... 
doi:10.1145/112600.112605 dblp:conf/podc/OstrovskyY91 fatcat:dp4ujza57rev7dghzgjj2uthzu

Knowledge sharing, maintenance, and use in online support communities

Derek L. Hansen
2006 CHI '06 extended abstracts on Human factors in computing systems - CHI EA '06  
The funding I received as a STIET fellow allowed me to follow my passion and study an online medical support group early in the program, a study that ultimately led to my dissertation topic.  ...  Although I can't mention everyone by name, a few are worth special notice. I owe much to my advisor Paul Resnick, who has played an instrumental role in my education since the day I showed up at SI.  ...  Putting it Together In summary, online support communities are distributed, computer-mediated communities of practice focused on supporting the needs of individuals who are trying to make sense of, and  ... 
doi:10.1145/1125451.1125780 dblp:conf/chi/Hansen06 fatcat:7ea5meupanelvnc5h5zw37wll4

GLAD: Group Anomaly Detection in Social Media Analysis- Extended Abstract [article]

Qi Yu, Xinran He, Yan Liu
2014 arXiv   pre-print
In this paper, we take a generative approach by proposing a hierarchical Bayes model: Group Latent Anomaly Detection (GLAD) model.  ...  Traditional anomaly detection on social media mostly focuses on individual point anomalies while anomalous phenomena usually occur in groups.  ...  We divide the 24 months records into 8 time slots, where each slot denotes a 3-month interval. Then we apply the method of [13] to construct a network from original yay/nay votes.  ... 
arXiv:1410.1940v1 fatcat:t2zuwoylkrcurd5gfmq6g7tnq4

ENHANCEMENT FOR DATA SECURITY IN CLOUD COMPUTING ENVIRONMENT

GAWALI M. B., R. B. WAGH, S. P. PATIL
2012 International journal of computer and communication technology  
) to distribute the powerful computing capacity to end users' hands.  ...  Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing parallel computing and so on.  ...  The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer or remoter server.  ... 
doi:10.47893/ijcct.2012.1139 fatcat:niq6wqhwsfaslcn42lgr6b5vae

Distortion-Free Authentication Watermarking [chapter]

Sukriti Bhattacharya, Agostino Cortesi
2013 Communications in Computer and Information Science  
In this paper 1 we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism  ...  based on the Abstract Interpretation framework.  ...  In order to generate the partitions, for each tuple r ∈ T (R), the data partitioning algorithm computes a message authenticated code (MAC) using HMAC [18] .  ... 
doi:10.1007/978-3-642-29578-2_13 fatcat:gagjocmrx5gcnmk34rkvns6kgy
« Previous Showing results 1 — 15 out of 74,475 results