Filters








2,359 Hits in 6.7 sec

Multiversion locking protocol with freezing for secure real-time database systems

Chanjung Park, Seog Park, S.H. Son
2002 IEEE Transactions on Knowledge and Data Engineering  
Database systems for real-time applications must satisfy timing constraints associated with transactions.  ...  In this paper, we propose a new multiversion concurrency control protocol that ensures that both security and real-time requirements are met. The proposed protocol is primarily based on locking.  ...  ACKNOWLEDGMENTS This research was supported in part by the Brain Korea 21 Project in 2001.  ... 
doi:10.1109/tkde.2002.1033780 fatcat:y6y6y2ub3rcl3fuvczclsjzpeu

Concurrent Control Algorithm for Large-scale Remote Multi-user Information Management System

Dawei Zhao
2022 North atlantic university union: International Journal of Circuits, Systems and Signal Processing  
In this paper, a concurrency control algorithm for large-scale remote multi-user information management system is proposed.  ...  When the current concurrency control algorithm is used to control of the multi-user information management system, the system's channel transmission capability is low, and the time it takes is long.  ...  At the same time, they provide filtering and security functions; the main function of the communication server is to save Threads, real-time database receiving, sending, and parsing threads; What the customer  ... 
doi:10.46300/9106.2022.16.7 fatcat:6sxb4nwbyrbjbnyoay4x3sku5q

Pre-serialization of long running transactions to improve concurrency in mobile environments

Angelo Chianese, A. d'Acierno, V. Moscato, A. Picariello
2008 2008 IEEE 24th International Conference on Data Engineering Workshop  
order to increase the concurrency reconcilable operations on the same resources.  ...  Differently from other techniques presented in the literature, we design a sort of hybrid approach between optimistic and pessimistic concurrency models.  ...  Most of the progress on the concurrency control theory and 2PL protocols, have been also obtained in the Real Time Data Base (RTDB) realm, characterized by having long and complex transaction.  ... 
doi:10.1109/icdew.2008.4498304 dblp:conf/icde/ChianesedMP08 fatcat:tynzdbc3hfcn3efk3o467vv66u

A framework for structured distributed object computing

K.Mani Chandy, Joseph Kiniry, Adam Rifkin, Daniel Zimmerman
1998 Parallel Computing  
Our system uses a sliding window protocol [29] to manage the messages in transit. 8  ...  A connection is a first-in-first-out, directed, secure, error-free broadcast channel from the outbox to each connected inbox.  ...  Or, Samantha might wish to run the experiment again for real. In that case she would have to schedule time on the telescope and the supercomputer.  ... 
doi:10.1016/s0167-8191(98)00083-0 fatcat:ioy3tdzenfginaqzwtzmpuvxde

Design of an Intelligent Nursing Information Management System for Critically Ill Patients in Neurosurgery

Hongrong Wang, Yan Liu, Fang Liu, Rahim Khan
2022 Journal of Healthcare Engineering  
Secondly, a nursing information management system for critically ill patients in neurosurgery is designed.  ...  In hospitals, one of the dominant issues is the development of an accurate and precise nursing management system which is hard to implement due to the various problems in the implementation of the traditional  ...  After the number of concurrent threads is greater than 1024, although the average response time of the system also increases significantly, the impact of millisecond-level changes on the real-time response  ... 
doi:10.1155/2022/2848255 pmid:35419187 pmcid:PMC9001076 fatcat:groucolgjrhy7mtizcz7khnmku

Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making

Jinhong Yang, Md Onik, Nam-Yong Lee, Mohiuddin Ahmed, Chul-Soo Kim
2019 Applied Sciences  
The current healthcare sector is facing difficulty in satisfying the growing issues, expenses, and heavy regulation of quality treatment.  ...  Privacy, security, and lack of confidence among stakeholders are the main downsides of extensive medical collaboration.  ...  This shall then enable the system to be commercially used in a broader scope with more accuracy.  ... 
doi:10.3390/app9071370 fatcat:otftivlnhva2zjki3xohmbkf7u

A Survey of Challenges for Runtime Verification from Advanced Application Domains (Beyond Software) [article]

César Sánchez and Gerardo Schneider and Wolfgang Ahrendt and Ezio Bartocci and Domenico Bianculli and Christian Colombo and Yliés Falcone and Adrian Francalanza and Sran Krstić and Joa̋o M. Lourenço and Dejan Nickovic and Gordon J. Pace and Jose Rufino and Julien Signoles and Dmitriy Traytel and Alexander Weiss
2018 arXiv   pre-print
Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors  ...  Other activities involve the instrumentation of the system to generate the trace and the communication between the system under analysis and the monitor.  ...  The authors would like to thank Fonenantsoa Maurica and Pablo Picazo-Sanchez for their feedback on parts of a preliminary version of this document.  ... 
arXiv:1811.06740v1 fatcat:4bxx5tvfpzez3jidsj22flibv4

Medical Intelligent System and Orthopedic Clinical Nursing Based on Graph Partition Sampling Algorithm

Xiucheng Heng, Yufei Chen, Lihong Liu, Jun Ye
2022 Computational Intelligence and Neuroscience  
At the same time, the system also defines audio and video encoding and decoding standards.  ...  In order to meet the requirements of the system design, the goal of the system design is to use the latest computing and network communication technology to organically "connect" the nursing staff, the  ...  Because the data security of file storage and network storage is not easy to control, the system uses database storage.  ... 
doi:10.1155/2022/2764157 pmid:35747719 pmcid:PMC9213159 fatcat:5lytseian5dilmcnwyd43hjlrq

Floor control for multimedia conferencing and collaboration

Hans-Peter Dommel, J.J. Garcia-Luna-Aceves
1997 Multimedia Systems  
The differences to session control, as well as concurrency control and access control are elicited.  ...  User-related aspects such as floor presentation, assignment, and the timely stages of floor-controlled interaction in relation to user-interface design are also presented.  ...  This work was supported in part by the Office of Naval Research (ONR) under contract N-00014-92-J-1807.  ... 
doi:10.1007/s005300050040 fatcat:uawclq7wszerhkszyoxjek5qpi

Design considerations for the WISDM smart phone-based sensor mining architecture

Jeffrey W. Lockhart, Gary M. Weiss, Jack C. Xue, Shaun T. Gallagher, Andrew B. Grosner, Tony T. Pulickal
2011 Proceedings of the Fifth International Workshop on Knowledge Discovery from Sensor Data - SensorKDD '11  
Combined with the ubiquity and portability of these devices, these sensors provide us with an unprecedented view into people's lives-and an excellent opportunity for data mining.  ...  In this paper we discuss these limitations, their impact, and propose a solution based on our WISDM (WIireless Sensor Data Mining) smart phone-based sensor mining architecture.  ...  It must also generate results in real-time, which means applying any learned models to the sensor data in real-time (most activity recognition systems require this).  ... 
doi:10.1145/2003653.2003656 fatcat:bho6g27c5jfm7b43wour5ky4u4

A survey of challenges for runtime verification from advanced application domains (beyond software)

César Sánchez, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliés Falcone, Adrian Francalanza, Srđan Krstić, Joa̋o M. Lourenço, Dejan Nickovic, Gordon J. Pace (+4 others)
2019 Formal methods in system design  
Typically, the two main activities in runtime verification efforts are the process of creating monitors from specifications, and the algorithms for the evaluation of traces against the generated monitors  ...  Other activities involve the instrumentation of the system to generate the trace and the communication between the system under analysis and the monitor.  ...  The authors would like to thank Fonenantsoa Maurica and Pablo Picazo-Sanchez for their feedback on parts of a preliminary version of this document, and the anonymous reviewers for the constructive corrections  ... 
doi:10.1007/s10703-019-00337-w fatcat:6vu5odqyjjbkvf255bsxcchane

A Guided Approach for Personalized Information Search and Visualization

Wei-Bang Chen, Yufeng Li, Seng-Jaw Soong, Dongquan Chen
2008 Interdisciplinary Journal of Information, Knowledge, and Management  
The system has great potential to serve a large number of concurrent users.  ...  The implemented digital certification kept both convenient access and the highest possible level of security for the retrieved information.  ...  Access Control and Security Enhancement over the Clinical Information Access control is necessary only for the stored clinical information or any user information considered private.  ... 
doi:10.28945/87 fatcat:lzypmmqbwjdnxaznecuk46sbne

Multi-hazard Disaster Scenario Method and Emergency Management for Urban Resilience by Integrating Experiment–Simulation–Field Data

Rui Ba, Qing Deng, Yi Liu, Rui Yang, Hui Zhang
2021 Journal of Safety Science and Resilience  
In addition, a variety of field rescue and survey equipment, such as robots, Unmanned Aerial Vehicle (UAV), and Virtual Reality/Augmented Reality (VR/AR) technologies were utilized to acquire real-time  ...  Due to the frequent occurrence of multi-hazard disasters worldwide in recent years, effective multi-hazard scenario analysis is imperative for disaster rescue and emergency management.  ...  the National Key R&D Program of China (No. 2017YFC0803300) for their great contributions to this work.  ... 
doi:10.1016/j.jnlssr.2021.05.002 fatcat:l72dqrlflraqrns4o23vbxtfiq

Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Kuznetsov Dmitry, Tolstaya Anastasia, Zuykov Alexander
2013 International Journal of Computer Network and Information Security  
The developed security software is universal for people using mobile phones in professional and personal life because any stored information is protected from various attacks.  ...  This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal  ...  This module's primary objective is to assist the user in controlling applications' access to potentially dangerous functions on mobile devices in real time in the context of the threats mentioned above  ... 
doi:10.5815/ijcnis.2013.05.01 fatcat:n2waayib2jfnnijpxv5mqw2ykm

Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns

Jonathan L. Dautrich Jr., Emil Stefanov, Elaine Shi
2014 USENIX Security Symposium  
For real-world workloads, Burst ORAM can attain response times that are nearly optimal and orders of magnitude lower than the best existing ORAM systems by reducing online bandwidth costs and aggressively  ...  We present Burst ORAM, the first oblivious cloud storage system to achieve both practical response times and low total bandwidth consumption for bursty workloads.  ...  Path-PIR reports response times in the 40-50 second range for comparably-sized databases.  ... 
dblp:conf/uss/DautrichSS14 fatcat:wlyeiy6e5va6pcnquwc4updr7a
« Previous Showing results 1 — 15 out of 2,359 results