A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Backup and Recovery Mechanisms of Cassandra Database: A Review
2021
Journal of Digital Forensics, Security and Law
Cassandra is a NoSQL database having a peer-to-peer, ring-type architecture. Cassandra offers fault-tolerance, data replication for higher availability as well as ensures no single point of failure. ...
In addition, several possible solutions to address backup and recovery including recovery in case of disasters have been reviewed. ...
Distributed Data Recovery Architecture Based On Schema Segregation. Shribman Aidan, and Yasin
Hisham.
(2016).
Holistic
Disaster Recovery Approach
For
Big
Data
NoSQL
Workloads. ...
doi:10.15394/jdfsl.2021.1613
fatcat:dgxxbvtjhremhofipn4w3lgqt4
Infrastructure Management Information System Framework Requirements for Disasters
2007
Journal of computing in civil engineering
, distributed computing. ...
Presently, both publicly and privately initiated, computer-based systems designed for disaster management cannot meet the real-time data access and analysis needs at crucial stages, especially those occurring ...
To achieve these capabilities, as well as those outlined in the general criteria, the major area of customization implemented was in the system architecture, which was based on a distributed, three-tier ...
doi:10.1061/(asce)0887-3801(2007)21:2(90)
fatcat:43skdamcpzbtxhzjlmltufjvty
Multilevel security issues in distributed database management systems
1988
Computers & security
This paper describes the security needs in a distributed processing environment common to many enterprises and discusses the applicability of multilevel secure database management systems in such an environment ...
The recommended near-term solutions are three families of architectures. One is based on integrity locks, another based on developing kernelized DBMS and the third based on distributed data. ...
Designs of MLS/DBMS Based on Data Distribution The architectures proposed by the Air Force Summer Study for an MLS / DBMS are generalized in Fig. 3 . ...
doi:10.1016/0167-4048(88)90579-2
fatcat:v7oueqowofgqdd3rp4455qpyhy
The Vertica Analytic Database: C-Store 7 Years Later
[article]
2012
arXiv
pre-print
This paper describes the system architecture of the Vertica Analytic Database (Vertica), a commercialization of the design of the C-Store research prototype. ...
modern commercial RDBMS system that presents a classical relational interface while at the same time achieving the high performance expected from modern "web scale" analytic systems by making appropriate architectural ...
Despite the automatic parallelization, Vertica does provide a way to keep data segregated in physical structures based on value through a simple syntax: CREATE TABLE ... PARTITION BY <expr>. ...
arXiv:1208.4173v1
fatcat:wjv6z3hu7zf3hkoevcv4ugdwiq
The vertica analytic database
2012
Proceedings of the VLDB Endowment
This paper describes the system architecture of the Vertica Analytic Database (Vertica), a commercialization of the design of the C-Store research prototype. ...
modern commercial RDBMS system that presents a classical relational interface while at the same time achieving the high performance expected from modern "web scale" analytic systems by making appropriate architectural ...
Despite the automatic parallelization, Vertica does provide a way to keep data segregated in physical structures based on value through a simple syntax: CREATE TABLE ... PARTITION BY <expr>. ...
doi:10.14778/2367502.2367518
fatcat:mlryxqlp5ncqnf66jgsks5qv24
Using Digital Twins and Intelligent Cognitive Agencies to Build Platforms for Automated CxO Future of Work
[article]
2018
arXiv
pre-print
In this paper, design principles based on computational thinking are used to engineer the architecture and infrastructure for such CxO automation platforms. ...
AI, Algorithms and Machine based automation of executive functions in enterprises and institutions is an important niche in the current considerations about the impact of digitalization on the future of ...
The Platform's architecture design, inevitably, will be modified, adapted and re-engineered, based on the results obtained as the research proceeds. ...
arXiv:1808.07627v1
fatcat:s74bfjresbc3lipkgcrkzsrobe
Experiences on File Systems: Which is the best file system for you?
2015
Journal of Physics, Conference Series
On the other hand, the general and simple file system interface makes it notoriously difficult for a distributed file system to perform well under a variety of different workloads. ...
The distributed file system landscape is scattered. Besides a plethora of research file systems, there is also a large number of production grade file systems with various strengths and weaknesses. ...
They provide some data organization due to the hierarchical namespace but no schema is imposed on the contents of the files. ...
doi:10.1088/1742-6596/664/4/042004
fatcat:q6wmxssh7vbftjyncwzlcyktsa
Smart Card Identification Management Over A Distributed Database Model
2011
Journal of Computer Science
Approach: Such data can be held in a database relation in a distributed database environment. ...
Conclusion/Recommendations: A conceptualization of the database structures and architecture of the distributed database model is presented. ...
database environment
Fig. 2 : 2 Fig. 2: Distributed Database Environment Distributed database architecture in Fig.2, describes the situation where a database is in more than one location but still accessible ...
doi:10.3844/jcssp.2011.1770.1777
fatcat:ktb5hgojwjfpxd3vo4jt4za4xi
A Service-Oriented Componentization Framework for Java Software Systems
2006
2006 13th Working Conference on Reverse Engineering
I also want to thank my lovely son, Zihan, for letting Dad work on his dissertation when he needed to do so. I feel very lucky to have a family that shares my enthusiasm for academic pursuits. ...
Our initial evaluation has shown that the proposed framework is effective in identifying services from an object-oriented design and migrating it to a service-oriented architecture. iii I want to thank ...
Chapter 4
Architecture Recovery Software architecture recovery aims at reconstructing views on the architecture as-built. ...
doi:10.1109/wcre.2006.7
dblp:conf/wcre/LiT06
fatcat:lizqlmikmvcoviell6qov4dzgq
Native support of multi-tenancy in RDBMS for software as a service
2011
Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT '11
This approach implements data isolation between tenants, per-tenant schema extension and further tenant-centric data management features in application logic. ...
We present a schema inheritance concept that allows sharing a core application schema among tenants while enabling schema extensions per tenant. ...
physically segregated resources. ...
doi:10.1145/1951365.1951382
dblp:conf/edbt/SchillerSBM11
fatcat:yiyd5u2oufcapa6vmvlc3nmhd4
Vertical Pod Autoscaling in Kubernetes for Elastic Container Collaborative燜ramework
2023
Computers Materials & Continua
On the other hand, the emergence of industry 4.0 brought new challenges for the adaptability and infusion of cloud computing. ...
Provision of such autonomous mechanism that can develop, manage and operationalize digital resources like CoBots to perform tasks in a distributed and collaborative cloud environment for optimized utilization ...
Considering the problem statement, it is required to deal with the dynamic nature of collaborative schema; therefore, on cloud platform, segregation of relevant structuring is vital to formulate cloud ...
doi:10.32604/cmc.2023.032474
fatcat:5whvk5xlerdtxjiyjw4ywmmsmm
Security Issues in Service Model of Cloud Computing Environment
2016
Procedia Computer Science
Cloud computing is becoming increasingly fashionable in distributed computing environment. Processing and Data storage use cloud environment is becoming a movement universal. ...
Cloud computing can be seen since Internet-based computing, in which shared resources, software, and information are made available to devices on demand. ...
on its security architecture and is agreeable to accept regular security audit. ...
doi:10.1016/j.procs.2016.05.156
fatcat:i4rpno6ktvgabgsx6jkh5cwive
A Thread-Oriented Memory Resource Management Framework for Mobile Edge Computing
2019
IEEE Access
From our previous research, we know that the fragmentation is no longer a crucial bottleneck; instead, inter-and intra-thread behavior should be focused on, and thus, we introduce memory management based ...
Unfortunately, it lacks a unified optimization program interface and good architecture. ...
The plug-in we designed is based on the PASR and prolongs memory free time by clustering data together. ...
doi:10.1109/access.2019.2909642
fatcat:z4cddngpvberlakq4m7ufk7qwq
Smart card embedded information systems: a methodology for privacy oriented architectural design
2002
Data & Knowledge Engineering
We propose a joint approach to the logical and physical database design phases supporting the required security levels, on the basis that all information is stored on the Flash-EEPROM storage medium, managed ...
Privacy concerns are relevant due to the fact that personal information may be stored on the card (e.g. medical records). ...
of data for recovery purposes. ...
doi:10.1016/s0169-023x(02)00039-3
fatcat:jqj2rx5oa5a5vmoct5lagnonrm
Fog Computing-Security Platform for IoT and Cloud in-Healthcare System
2019
International Journal of Engineering and Advanced Technology
Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical ...
On-demand: Cloud computing is based on the architecture that the service client can access a service based on their request which is a process that will be fulfilled automatically [1] . ...
The development of the virtualization of resources in a distributed network has introduced the need for security of the data in the cloud, consistency of the on-demand data and availability of data for ...
doi:10.35940/ijeat.b3608.129219
fatcat:msl772ddsvcw7fus42c7iqpprq
« Previous
Showing results 1 — 15 out of 1,670 results