Search
Now showing items 1-5 of 5
Volatility-Aware Query Processing in Peer-to-Peer Systems
(University of Missouri--Kansas City, 2010)
with highly transient populations of peers, and the dynamicity of P2P systems. CDQP assumes peers participating in a query plan are always present during query execution. Furthermore, it uses the compile-then-execute approach whose effectiveness relies heavily...
Distributed Perimeter Firewall Policy Management Framework
(University of Missouri--Kansas City, 2017)
A perimeter firewall is the first line of defense that stops unwanted packets (based on
defined firewall policies) entering the organization that deploys it. In the real world, every
organization maintains a perimeter ...
Improving Transaction Acceptance of Incoherent Updates Using Dynamic Merging In a Relational Database
(2015)
Despite its tenure, mobile computing continues to move to the forefront of technology and business.
This ever expansive field holds no shortages of opportunity for either party. Its benefits and
demand are abundant but it ...
Security in pervasive health care using location-based key generation schemes
(University of Missouri--Kansas City, 2011-08-15)
Remote health monitoring has tremendous potential to improve quality of health
care services in modern and ubiquitous medical environments. It helps to cut the cost in
modern healthcare by avoiding unnecessary hospital ...
Managing malicious transactions in mobile database systems
(University of Missouri--Kansas City, 2012)
Database security is one of the most important issues for any organization,
especially for financial institutions such as banks. Protecting database from external
threats is relatively easier and a number of effective ...