Filters








475 Hits in 3.5 sec

Middleware-based Database Replication: The Gaps between Theory and Practice [article]

Emmanuel Cecchet, George Candea, Anastasia Ailamaki
2008 arXiv   pre-print
This has created over time a gap between academic research and industrial practice. This paper aims to characterize the gap along three axes: performance, availability, and administration.  ...  We propose two agendas, one for academic research and one for industrial R&D, which we believe can bridge the gap within 5-10 years.  ...  ACKNOWLDEGEMENTS We are grateful to our academic and industrial partners for their feedback and contributions and especially to Gustavo Alonso, Robert Hodges, Bettina Kemme, and Dheeraj Pandey for their  ... 
arXiv:0712.2773v2 fatcat:3tojppuxdnfypi7lkysnkfnmny

Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network

Prakash Veeraraghavan, Dalal Hanna, Eric Pardede
2019 Electronics  
Motivated through these problems, in this paper, we propose an efficient and scalable multicast architecture for distributing management and routing information in a LAN.  ...  We use Core-based Tree (CBT) for constructing the multicast delivery tree and the pseudo identity-based encryption of the underlying cryptosystem.  ...  In this paper, we address the gap by providing an efficient algorithm to establish a robust and secure multicast tree.  ... 
doi:10.3390/electronics8101162 fatcat:2vck7qm5kvdexdvkrurvxeyhmu

A Systematic Survey of Self-Protecting Software Systems

Eric Yuan, Naeem Esfahani, Sam Malek
2014 ACM Transactions on Autonomous and Adaptive Systems  
While existing research has made significant progress towards autonomic and adaptive security, gaps and challenges remain.  ...  By proposing and applying a comprehensive taxonomy to classify and characterize the state-of-the-art research in this area, we have identified key patterns, trends and challenges in the existing approaches  ...  -RQ3: What patterns, gaps, and challenges could be inferred from the current research efforts that will inform future research?  ... 
doi:10.1145/2555611 fatcat:e5ewgaqqr5fxtjtsbmebusneju

COINS: An economic development tool for education, economic and workforce development in Open Source Economic Development

Betsey Merkel
2010 Procedia - Social and Behavioral Sciences  
This paper begins a discussion of the value collaborative innovation networks (COINS) offer to accelerate and strengthen innovation in Open Source Economic Development (OSED) in the Civic Space, and to  ...  By collaborating with research in the emerging Science of Collaboration, this practical model will strengthen research as well as individual experience and collaborative behaviours to create new knowledge  ...  What is the system you see? What are the connections and where are the gaps?  ... 
doi:10.1016/j.sbspro.2010.04.061 fatcat:abdvu3gt7nhjpagw7zpjw7huoq

Dynamic binding in mobile applications - A middleware approach

P. Bellavista, A. Corradi, R. Montanari, C. Stefanelli
2003 IEEE Internet Computing  
A Middleware Approach By separating binding concerns from application logic, the Colomba approach exploits metadata to let mobile applications adapt to dynamic environments.  ...  Acknowledgments This work is supported by the Italian Ministry, University Research and Instruction (MIUR) in the framework of the FIRB WEB-MINDS and the CNR IS-MANET projects.  ...  The Surrogate research project (http://surrogate.jini.org) tries to fill the gap between Jini and wireless devices that cannot run a JVM by specifying surrogate proxies that non-Java-based portable devices  ... 
doi:10.1109/mic.2003.1189187 fatcat:i6wcdgcigfhvxcxbw5qicwhob4

A portable network forensic evidence collector

Bruce J. Nikkel
2006 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The device can be precongured in the forensics lab, and deployment delegated to sta not specically trained in forensics. Details of the architecture, construction and operation are described.  ...  It operates at the link layer allowing the device to be transparently inserted inline between a network node and the rest of a network.  ...  While this risk exists, it should be mentioned that the prototype device has been running continuously in a testing/research lab for many months with no availability problems due to heat, hardware or OS  ... 
doi:10.1016/j.diin.2006.08.012 fatcat:a3yfcoi3snduldmbqqtzqdxovu

Application mobility in pervasive computing: A survey

Ping Yu, Xiaoxing Ma, Jiannong Cao, Jian Lu
2013 Pervasive and Mobile Computing  
For a better understanding of the challenges and existing approaches to application mobility, this paper surveys related work with a classification and comparison framework established along four dimensions  ...  This advanced feature, recognized as application mobility, brings many challenges to the pervasive computing community.  ...  In particular, we discuss the architecture style of the client side and the server side.  ... 
doi:10.1016/j.pmcj.2012.07.009 fatcat:fr3cxacgb5h75clstqtnu4ffc4

Middleware-based database replication

Emmanuel Cecchet, George Candea, Anastasia Ailamaki
2008 Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08  
This has created over time a gap between academic research and industrial practice. This paper aims to characterize the gap along three axes: performance, availability, and administration.  ...  Section 5 distills the main challenges and outlines roadmaps for both academic research and industrial R&D that can bridge the identified gaps. Section 6 concludes the paper.  ...  BRIDGING THE GAP We now suggest a number of directions and areas for both academic research and industrial R&D, where innovative solutions could have a significant practical impact.  ... 
doi:10.1145/1376616.1376691 dblp:conf/sigmod/CecchetCA08 fatcat:xpjilgjvs5dihkom7wy5mhwley

A Novel Query Caching Scheme for Dynamic InfiniBand Subnets

Evangelos Tasoulas, Ernst Gunnar Gran, Bjorn Dag Johnsen, Tor Skeie
2015 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing  
The advent of the Internet of Things, sensor and social networks, to mention just a few examples, all contribute towards the solid establishment of the Big Data era.  ...  in the important discussions that shaped the direction of my work and introduced industrial relevance.  ...  The RDS protocol has built-in reconnection functionality in the case when the communication is interrupted, thus, the reconnection is transparent to the upper level application that is using RDS.  ... 
doi:10.1109/ccgrid.2015.10 dblp:conf/ccgrid/TasoulasGJS15 fatcat:hsxswl63gfbtbdipuhvrhx6y7u

Software agents: Languages, tools, platforms

Costin Bădică, Zoran Budimac, Hans-Dieter Burkhard, Mirjana Ivanovic
2011 Computer Science and Information Systems  
, presents the most wellknown agent architectures, and explores the two most important agent communication approaches.  ...  PhD students and young researchers can find plenty of useful information and state-of-the-art in the domain of available languages and platforms for programming software agents.  ...  Research was partially supported by the Ministry of Education and Science, Republic of Serbia, through project no.  ... 
doi:10.2298/csis110214013b fatcat:bc64xixmdvgotddftc3nrcodsy

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 SIGARCH Computer Architecture News  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  We review basic obstacles to classical virtualization of the x86 architecture, explain how binary translation (BT) overcomes the obstacles, and show that adaptive BT improves efficiency.  ...  Warmest thanks to our readers: Eli Collins, Erik Cota-Robles, Alex Garthwaite, Geoff Pike, Mendel Rosenblum, and Richard Uhlig.  ... 
doi:10.1145/1168919.1168860 fatcat:3zfojsbisvaejmtuzgyxk6heei

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  We review basic obstacles to classical virtualization of the x86 architecture, explain how binary translation (BT) overcomes the obstacles, and show that adaptive BT improves efficiency.  ...  Warmest thanks to our readers: Eli Collins, Erik Cota-Robles, Alex Garthwaite, Geoff Pike, Mendel Rosenblum, and Richard Uhlig.  ... 
doi:10.1145/1168857.1168860 dblp:conf/asplos/AdamsA06 fatcat:ehz2gj3ivzgfvprvnshck76sti

Architecture of a Database System

Joseph M. Hellerstein, Michael Stonebraker, James Hamilton
2007 Foundations and Trends in Databases  
Database Management Systems (DBMSs) are a ubiquitous and critical component of modern computing, and the result of decades of research and development in both academia and industry.  ...  optimizer architectures, and typical shared components and utilities.  ...  Muralidhar, Pat Selinger, Mehul Shah, and Matt Welsh for background information and comments on early drafts of this paper.  ... 
doi:10.1561/1900000002 fatcat:ve6wkgbgrngppk3cjcbfsevuye

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 ACM SIGOPS Operating Systems Review  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  We review basic obstacles to classical virtualization of the x86 architecture, explain how binary translation (BT) overcomes the obstacles, and show that adaptive BT improves efficiency.  ...  Warmest thanks to our readers: Eli Collins, Erik Cota-Robles, Alex Garthwaite, Geoff Pike, Mendel Rosenblum, and Richard Uhlig.  ... 
doi:10.1145/1168917.1168860 fatcat:r4adwx7udrbo5f43d5qobvz4mm

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 SIGPLAN notices  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  We review basic obstacles to classical virtualization of the x86 architecture, explain how binary translation (BT) overcomes the obstacles, and show that adaptive BT improves efficiency.  ...  Warmest thanks to our readers: Eli Collins, Erik Cota-Robles, Alex Garthwaite, Geoff Pike, Mendel Rosenblum, and Richard Uhlig.  ... 
doi:10.1145/1168918.1168860 fatcat:vaeyhd4ccvdkbhbq3ogjclown4
« Previous Showing results 1 — 15 out of 475 results