• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,277
Next 10 →

Security without identification: transaction systems to make Big Brother obsolete

by David Chaum
"... The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. DAVID CHAUM Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. A ..."
Abstract - Cited by 505 (3 self) - Add to MetaCart
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. DAVID CHAUM Computerization is robbing individuals of the ability to monitor and control the ways information about them is used

Weighted Voting for Replicated Data

by David K. Gifford , 1979
"... In a new algorithm for maintaining replicated data, every copy of a replicated file is assigned some number of votes. Every transaction collects a read quorum of r votes to read a file, and a write quorum of w votes to write a file, such that r+w is greater than the total number number of votes assi ..."
Abstract - Cited by 598 (0 self) - Add to MetaCart
In a new algorithm for maintaining replicated data, every copy of a replicated file is assigned some number of votes. Every transaction collects a read quorum of r votes to read a file, and a write quorum of w votes to write a file, such that r+w is greater than the total number number of votes

The design and implementation of an intentional naming system

by William Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, Jeremy Lilley - 17TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '99) PUBLISHED AS OPERATING SYSTEMS REVIEW, 34(5):186--201, DEC. 1999 , 1999
"... This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based o ..."
Abstract - Cited by 518 (14 self) - Add to MetaCart
This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based

Pig Latin: A Not-So-Foreign Language for Data Processing

by Christopher Olston, Benjamin Reed, Utkarsh Srivastava, Ravi Kumar, Andrew Tomkins
"... There is a growing need for ad-hoc analysis of extremely large data sets, especially at internet companies where innovation critically depends on being able to analyze terabytes of data collected every day. Parallel database products, e.g., Teradata, offer a solution, but are usually prohibitively e ..."
Abstract - Cited by 607 (13 self) - Add to MetaCart
for the development and execution of their data analysis tasks, compared to using Hadoop directly. We also report on a novel debugging environment that comes integrated with Pig, that can lead to even higher productivity gains. Pig is an open-source, Apache-incubator project, and available for general use. 1.

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies

FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment

by Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - IN PROCEEDINGS OF THE 5TH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI , 2002
"... Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides file availability and reliability through randomized replicated storage; it ensures the secrecy of file contents with cry ..."
Abstract - Cited by 487 (13 self) - Add to MetaCart
with cryptographic techniques; it maintains the integrity of file and directory data with a Byzantine-fault-tolerant protocol; it is designed to be scalable by using a distributed hint mechanism and delegation certificates for pathname translations; and it achieves good performance by locally caching file data

An overview of data warehousing and OLAP technology

by Surajit Chaudhuri, Umeshwar Dayal - SIGMOD Record , 1997
"... Data warehousing and on-line analytical processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Many commercial products and services are now available, and all of the principal database management system vendors now have offering ..."
Abstract - Cited by 386 (3 self) - Add to MetaCart
Data warehousing and on-line analytical processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Many commercial products and services are now available, and all of the principal database management system vendors now have

The Transaction Concept: Virtues and Limitations

by Jim Gray , 1981
"... A transaction is a transformation of state which has the properties of atomicity (all or nothing), durability (effects survive failures) and consistency (a correct transformation). The transaction concept is key to the structuring of data management applications. The concept may have applicability ..."
Abstract - Cited by 300 (0 self) - Add to MetaCart
applicability to programming systems in general. This paper restates the transaction concepts and attempts to put several implementation approaches in perspective. It then describes some areas which require further study: (1) the integration of the transaction concept with the notion of abstract data type, (2

The iFlame Client-Based Instantaneous Datagram Communication Substrate

by David Michael Lamacchia, David Michael Lamacchia , 1996
"... This thesis investigates a new protocol, iFlame, designed to provide highly scalable, distributed, real-time communication systems for the Internet. Scalability is achieved by using a client-oriented model rather than a more traditional server-centric one. The protocol specifies that servers maintai ..."
Abstract - Add to MetaCart
maintain the locations of clients, but transactions are committed in a client-to-client fashion. iFlame is unique because it requires each client to be responsible for handling the load associated with the transactions it initiates. The claims of the protocol are demonstrated in an implementation called

The iFlame Client-Based Instantaneous Datagram Communication Substrate

by Walter Bender, Frederic R. Morgenthaler, David Michael Lamacchia, David Michael Lamacchia , 1996
"... This thesis investigates a new protocol, iFlame, designed to provide highly scalable, distributed, real-time communication systems for the Internet. Scalabilityisachieved by using a client-oriented model rather than a more traditional server-centric one. The protocol specifies that servers maintain ..."
Abstract - Add to MetaCart
This thesis investigates a new protocol, iFlame, designed to provide highly scalable, distributed, real-time communication systems for the Internet. Scalabilityisachieved by using a client-oriented model rather than a more traditional server-centric one. The protocol specifies that servers maintain
Next 10 →
Results 1 - 10 of 4,277
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University