Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,670 Hits in 6.4 sec

Backup and Recovery Mechanisms of Cassandra Database: A Review

Karina Bohora, Amol Bothe, Damini Sheth, Rupali Chopade
2021 Journal of Digital Forensics, Security and Law  
Cassandra is a NoSQL database having a peer-to-peer, ring-type architecture. Cassandra offers fault-tolerance, data replication for higher availability as well as ensures no single point of failure.  ...  In addition, several possible solutions to address backup and recovery including recovery in case of disasters have been reviewed.  ...  Distributed Data Recovery Architecture Based On Schema Segregation. Shribman Aidan, and Yasin Hisham. (2016). Holistic Disaster Recovery Approach For Big Data NoSQL Workloads.  ... 
doi:10.15394/jdfsl.2021.1613 fatcat:dgxxbvtjhremhofipn4w3lgqt4

Infrastructure Management Information System Framework Requirements for Disasters

Anu R. Pradhan, Debra F. Laefer, William J. Rasdorf
2007 Journal of computing in civil engineering  
, distributed computing.  ...  Presently, both publicly and privately initiated, computer-based systems designed for disaster management cannot meet the real-time data access and analysis needs at crucial stages, especially those occurring  ...  To achieve these capabilities, as well as those outlined in the general criteria, the major area of customization implemented was in the system architecture, which was based on a distributed, three-tier  ... 
doi:10.1061/(asce)0887-3801(2007)21:2(90) fatcat:43skdamcpzbtxhzjlmltufjvty

Multilevel security issues in distributed database management systems

John McHugh, Bhavani M. Thuraisingham
1988 Computers & security  
This paper describes the security needs in a distributed processing environment common to many enterprises and discusses the applicability of multilevel secure database management systems in such an environment  ...  The recommended near-term solutions are three families of architectures. One is based on integrity locks, another based on developing kernelized DBMS and the third based on distributed data.  ...  Designs of MLS/DBMS Based on Data Distribution The architectures proposed by the Air Force Summer Study for an MLS / DBMS are generalized in Fig. 3 .  ... 
doi:10.1016/0167-4048(88)90579-2 fatcat:v7oueqowofgqdd3rp4455qpyhy

The Vertica Analytic Database: C-Store 7 Years Later [article]

Andrew Lamb, Matt Fuller, Ramakrishna Varadarajan, Nga Tran, Ben Vandier, Lyric Doshi, Chuck Bear
2012 arXiv   pre-print
This paper describes the system architecture of the Vertica Analytic Database (Vertica), a commercialization of the design of the C-Store research prototype.  ...  modern commercial RDBMS system that presents a classical relational interface while at the same time achieving the high performance expected from modern "web scale" analytic systems by making appropriate architectural  ...  Despite the automatic parallelization, Vertica does provide a way to keep data segregated in physical structures based on value through a simple syntax: CREATE TABLE ... PARTITION BY <expr>.  ... 
arXiv:1208.4173v1 fatcat:wjv6z3hu7zf3hkoevcv4ugdwiq

The vertica analytic database

Andrew Lamb, Matt Fuller, Ramakrishna Varadarajan, Nga Tran, Ben Vandiver, Lyric Doshi, Chuck Bear
2012 Proceedings of the VLDB Endowment  
This paper describes the system architecture of the Vertica Analytic Database (Vertica), a commercialization of the design of the C-Store research prototype.  ...  modern commercial RDBMS system that presents a classical relational interface while at the same time achieving the high performance expected from modern "web scale" analytic systems by making appropriate architectural  ...  Despite the automatic parallelization, Vertica does provide a way to keep data segregated in physical structures based on value through a simple syntax: CREATE TABLE ... PARTITION BY <expr>.  ... 
doi:10.14778/2367502.2367518 fatcat:mlryxqlp5ncqnf66jgsks5qv24

Using Digital Twins and Intelligent Cognitive Agencies to Build Platforms for Automated CxO Future of Work [article]

John-Thones Amenyo
2018 arXiv   pre-print
In this paper, design principles based on computational thinking are used to engineer the architecture and infrastructure for such CxO automation platforms.  ...  AI, Algorithms and Machine based automation of executive functions in enterprises and institutions is an important niche in the current considerations about the impact of digitalization on the future of  ...  The Platform's architecture design, inevitably, will be modified, adapted and re-engineered, based on the results obtained as the research proceeds.  ... 
arXiv:1808.07627v1 fatcat:s74bfjresbc3lipkgcrkzsrobe

Experiences on File Systems: Which is the best file system for you?

J Blomer
2015 Journal of Physics, Conference Series  
On the other hand, the general and simple file system interface makes it notoriously difficult for a distributed file system to perform well under a variety of different workloads.  ...  The distributed file system landscape is scattered. Besides a plethora of research file systems, there is also a large number of production grade file systems with various strengths and weaknesses.  ...  They provide some data organization due to the hierarchical namespace but no schema is imposed on the contents of the files.  ... 
doi:10.1088/1742-6596/664/4/042004 fatcat:q6wmxssh7vbftjyncwzlcyktsa

Smart Card Identification Management Over A Distributed Database Model

Olabode
2011 Journal of Computer Science  
Approach: Such data can be held in a database relation in a distributed database environment.  ...  Conclusion/Recommendations: A conceptualization of the database structures and architecture of the distributed database model is presented.  ...  database environment Fig. 2 : 2 Fig. 2: Distributed Database Environment Distributed database architecture in Fig.2, describes the situation where a database is in more than one location but still accessible  ... 
doi:10.3844/jcssp.2011.1770.1777 fatcat:ktb5hgojwjfpxd3vo4jt4za4xi

A Service-Oriented Componentization Framework for Java Software Systems

Shimin Li, Ladan Tahvildari
2006 2006 13th Working Conference on Reverse Engineering  
I also want to thank my lovely son, Zihan, for letting Dad work on his dissertation when he needed to do so. I feel very lucky to have a family that shares my enthusiasm for academic pursuits.  ...  Our initial evaluation has shown that the proposed framework is effective in identifying services from an object-oriented design and migrating it to a service-oriented architecture. iii I want to thank  ...  Chapter 4 Architecture Recovery Software architecture recovery aims at reconstructing views on the architecture as-built.  ... 
doi:10.1109/wcre.2006.7 dblp:conf/wcre/LiT06 fatcat:lizqlmikmvcoviell6qov4dzgq

Native support of multi-tenancy in RDBMS for software as a service

Oliver Schiller, Benjamin Schiller, Andreas Brodt, Bernhard Mitschang
2011 Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT '11  
This approach implements data isolation between tenants, per-tenant schema extension and further tenant-centric data management features in application logic.  ...  We present a schema inheritance concept that allows sharing a core application schema among tenants while enabling schema extensions per tenant.  ...  physically segregated resources.  ... 
doi:10.1145/1951365.1951382 dblp:conf/edbt/SchillerSBM11 fatcat:yiyd5u2oufcapa6vmvlc3nmhd4

Vertical Pod Autoscaling in Kubernetes for Elastic Container Collaborative燜ramework

Mushtaq Niazi, Sagheer Abbas, Abdel-Hamid Soliman, Tahir Alyas, Shazia Asif, Tauqeer Faiz
2023 Computers Materials & Continua  
On the other hand, the emergence of industry 4.0 brought new challenges for the adaptability and infusion of cloud computing.  ...  Provision of such autonomous mechanism that can develop, manage and operationalize digital resources like CoBots to perform tasks in a distributed and collaborative cloud environment for optimized utilization  ...  Considering the problem statement, it is required to deal with the dynamic nature of collaborative schema; therefore, on cloud platform, segregation of relevant structuring is vital to formulate cloud  ... 
doi:10.32604/cmc.2023.032474 fatcat:5whvk5xlerdtxjiyjw4ywmmsmm

Security Issues in Service Model of Cloud Computing Environment

B. Hari Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy
2016 Procedia Computer Science  
Cloud computing is becoming increasingly fashionable in distributed computing environment. Processing and Data storage use cloud environment is becoming a movement universal.  ...  Cloud computing can be seen since Internet-based computing, in which shared resources, software, and information are made available to devices on demand.  ...  on its security architecture and is agreeable to accept regular security audit.  ... 
doi:10.1016/j.procs.2016.05.156 fatcat:i4rpno6ktvgabgsx6jkh5cwive

A Thread-Oriented Memory Resource Management Framework for Mobile Edge Computing

Zongwei Zhu, Fan Wu, Jing Cao, Xi Li, Gangyong Jia
2019 IEEE Access  
From our previous research, we know that the fragmentation is no longer a crucial bottleneck; instead, inter-and intra-thread behavior should be focused on, and thus, we introduce memory management based  ...  Unfortunately, it lacks a unified optimization program interface and good architecture.  ...  The plug-in we designed is based on the PASR and prolongs memory free time by clustering data together.  ... 
doi:10.1109/access.2019.2909642 fatcat:z4cddngpvberlakq4m7ufk7qwq

Smart card embedded information systems: a methodology for privacy oriented architectural design

C. Bolchini, F.A. Schreiber
2002 Data & Knowledge Engineering  
We propose a joint approach to the logical and physical database design phases supporting the required security levels, on the basis that all information is stored on the Flash-EEPROM storage medium, managed  ...  Privacy concerns are relevant due to the fact that personal information may be stored on the card (e.g. medical records).  ...  of data for recovery purposes.  ... 
doi:10.1016/s0169-023x(02)00039-3 fatcat:jqj2rx5oa5a5vmoct5lagnonrm

Fog Computing-Security Platform for IoT and Cloud in-Healthcare System

2019 International Journal of Engineering and Advanced Technology  
Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical  ...  On-demand: Cloud computing is based on the architecture that the service client can access a service based on their request which is a process that will be fulfilled automatically [1] .  ...  The development of the virtualization of resources in a distributed network has introduced the need for security of the data in the cloud, consistency of the on-demand data and availability of data for  ... 
doi:10.35940/ijeat.b3608.129219 fatcat:msl772ddsvcw7fus42c7iqpprq
« Previous Showing results 1 — 15 out of 1,670 results