• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,818
Next 10 →

Federated database systems for managing distributed, heterogeneous, and autonomous databases

by Amit P. Sheth, James A. Larson - ACM Computing Surveys , 1990
"... A federated database system (FDBS) is a collection of cooperating database systems that are autonomous and possibly heterogeneous. In this paper, we define a reference architecture for distributed database management systems from system and schema viewpoints and show how various FDBS architectures c ..."
Abstract - Cited by 1218 (34 self) - Add to MetaCart
A federated database system (FDBS) is a collection of cooperating database systems that are autonomous and possibly heterogeneous. In this paper, we define a reference architecture for distributed database management systems from system and schema viewpoints and show how various FDBS architectures

Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility

by Antony Rowstron, Peter Druschel , 2001
"... This paper presents and evaluates the storage management and caching in PAST, a large-scale peer-to-peer persistent storage utility. PAST is based on a self-organizing, Internetbased overlay network of storage nodes that cooperatively route file queries, store multiple replicas of files, and cache a ..."
Abstract - Cited by 803 (23 self) - Add to MetaCart
and to balance the query load. We present and evaluate PAST, with an emphasis on its storage management and caching system. Extensive tracedriven experiments show that the system minimizes fetch distance, that it balances the query load for popular files, and that it displays graceful degradation of performance

Generating Representative Web Workloads for Network and Server Performance Evaluation

by Paul Barford, Mark Crovella , 1997
"... One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web worklo ..."
Abstract - Cited by 944 (11 self) - Add to MetaCart
One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web

Data Mining: Concepts and Techniques

by Jiawei Han, Micheline Kamber , 2000
"... Our capabilities of both generating and collecting data have been increasing rapidly in the last several decades. Contributing factors include the widespread use of bar codes for most commercial products, the computerization of many business, scientific and government transactions and managements, a ..."
Abstract - Cited by 3142 (23 self) - Add to MetaCart
Our capabilities of both generating and collecting data have been increasing rapidly in the last several decades. Contributing factors include the widespread use of bar codes for most commercial products, the computerization of many business, scientific and government transactions and managements

Another Puzzle: The Growth in Actively Managed Mutual Funds”.

by G Gruber , C Blake , M J Gruber , B Malkiel - The Journal of Finance, , 1996
"... Abstract Using genetic algorithm (GA), this study proposes a portfolio optimization scheme for index fund management. Index fund is one of popular strategies in portfolio management that aims at matching the performance of the benchmark index such as the S&P 500 in New York and the FTSE 100 in ..."
Abstract - Cited by 433 (8 self) - Add to MetaCart
Abstract Using genetic algorithm (GA), this study proposes a portfolio optimization scheme for index fund management. Index fund is one of popular strategies in portfolio management that aims at matching the performance of the benchmark index such as the S&P 500 in New York and the FTSE 100

When choice is demotivating: can one desire too much of a good thing

by Sheena S. Iyengar - Journal of Personality and Social Psychology , 2000
"... Current psychological theory and research affirm the positive affective and motivational consequences of having personal choice. These findings have led to the popular notion that the more choice, the better--that the human ability omanage, and the human desire for, choice isunlimited. Findings from ..."
Abstract - Cited by 438 (12 self) - Add to MetaCart
Current psychological theory and research affirm the positive affective and motivational consequences of having personal choice. These findings have led to the popular notion that the more choice, the better--that the human ability omanage, and the human desire for, choice isunlimited. Findings

Password Managers: Attacks and Defenses

by David Silver, Suman Jana, Eric Chen, Collin Jackson, Dan Boneh
"... We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party managers. We observe significant differences in autofill policies among password managers. Several a ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party managers. We observe significant differences in autofill policies among password managers. Several

The eucalyptus open-source cloud-computing system

by Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov - In Proceedings of Cloud Computing and Its Applications [Online
"... Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable applicati ..."
Abstract - Cited by 415 (9 self) - Add to MetaCart
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable

GridSim: A Toolkit for the Modeling and Simulation of Distributed Resource Management and Scheduling for Grid Computing

by Rajkumar Buyya, Manzur Murshed - CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE (CCPE , 2002
"... Clusters, grids, and peer-to-peer (P2P) networks have emerged as popular paradigms for next generation parallel and distributed computing. They enable aggregation of distributed resources for solving large-scale problems in science, engineering, and commerce. In grid and P2P computing environments, ..."
Abstract - Cited by 375 (64 self) - Add to MetaCart
Clusters, grids, and peer-to-peer (P2P) networks have emerged as popular paradigms for next generation parallel and distributed computing. They enable aggregation of distributed resources for solving large-scale problems in science, engineering, and commerce. In grid and P2P computing environments

On The Security of Password Manager Database Formats

by Paolo Gasti, Kasper B. Rasmussen , 2012
"... Abstract. Password managers are critical pieces of software relied upon by users to securely store valuable and sensitive information, from online banking passwords and login credentials to passport- and social security numbers. Surprisingly, there has been very little academic research on the secur ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
on the security these applications provide. This paper presents the first rigorous analysis of storage formats used by popular password managers. We define two realistic security models, designed to represent the capabilities of real-world adversaries. We then show how specific vulnerabilities in our models allow
Next 10 →
Results 1 - 10 of 7,818
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University