Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
Entity/Relationship Graphs: Principled Design, Modeling, and Data Integrity Management of Graph Databases
Proceedings of the ACM on Management of Data (PACMMOD), Volume 3, Issue 1Article No.: 40, Pages 1–26https://doi.org/10.1145/3709690Chen's Entity/Relationship (E/R) framework is a lingua franca for well-designed databases. We define E/R graphs as property graphs that are instances of E/R diagrams. As the latter are a subclass of PG-Schema, E/R modeling constitutes a methodology for ...
- research-articleJanuary 2024
Evolution may come with a price: analyzing user reviews to understand the impact of updates on mobile apps accessibility
- Paulo Sérgio Henrique Dos Santos,
- Alberto Dumont Alves Oliveira,
- Thais Bonjorni Nobre De Jesus,
- Wajdi Aljedaani,
- Marcelo Medeiros Eler
IHC '23: Proceedings of the XXII Brazilian Symposium on Human Factors in Computing SystemsArticle No.: 52, Pages 1–11https://doi.org/10.1145/3638067.3638081Mobile applications are constantly updated to adapt to evolving user and environment requirements. As changes are successively implemented to promote user satisfaction, the complexity of mobile apps increases, and overlooked quality aspects (e.g. ...
- research-articleMay 2023
Composite Object Normal Forms: Parameterizing Boyce-Codd Normal Form by the Number of Minimal Keys
Proceedings of the ACM on Management of Data (PACMMOD), Volume 1, Issue 1Article No.: 13, Pages 1–25https://doi.org/10.1145/3588693We parameterize schemata in Boyce-Codd Normal Form (BCNF) by the number n of minimal keys they exhibit. We show that n quantifies a trade-off between access variety and update complexity. Indeed, access variety refers to the number of different ways by ...
- research-articleJune 2023
Reducing Power Consumption during Server Maintenance on Edge Computing Infrastructures
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 691–698https://doi.org/10.1145/3555776.3577739Edge servers must routinely undergo maintenance to ensure the environment's performance and security. During maintenance, applications hosted by outdated servers must be relocated to alternative servers to avoid downtime. In distributed edges with ...
- posterFebruary 2022
HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication
FPGA '22: Proceedings of the 2022 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPage 52https://doi.org/10.1145/3490422.3502345Merkle tree is a widely used tree structure for authentication of data/metadata in a secure system. Even though recent state-of-the art systems use MAC based authentication to protect the actual data, they still use smaller-sized MT, namely Bonsai ...
-
LogECMem: coupling erasure-coded in-memory key-value stores with parity logging
SC '21: Proceedings of the International Conference for High Performance Computing, Networking, Storage and AnalysisArticle No.: 89, Pages 1–15https://doi.org/10.1145/3458817.3480852In-memory key-value stores are often used to speed up Big Data workloads on modern HPC clusters. To maintain their high availability, erasure coding has been recently adopted as a low-cost redundancy scheme instead of replication. Existing erasure-coded ...
- research-articleJune 2021
Logical Schema Design that Quantifies Update Inefficiency and Join Efficiency
SIGMOD '21: Proceedings of the 2021 International Conference on Management of DataPages 1169–1181https://doi.org/10.1145/3448016.3459238The goal of classical normalization is to maintain data consistency under updates, with a minimum level of effort. Given functional dependencies (FDs) alone, this goal is only achievable in the special case an FD-preserving Boyce-Codd Normal Form (BCNF) ...
- rfcApril 2021
RFC 9019: A Firmware Update Architecture for Internet of Things
Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing ...
- research-articleOctober 2020
Are apps ready for new Android releases?
MOBILESoft '20: Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and SystemsPages 66–76https://doi.org/10.1145/3387905.3388598Context: Android operating system always brings new releases and updates to improve security, increase performance and bring a better user experience. When Google announces a new release, a whole chain of changes is triggered in cascade, causing many ...
- rfcJune 2020
RFC 8765: DNS Push Notifications
The Domain Name System (DNS) was designed to return matching records efficiently for queries for data that are relatively static. When those records change frequently, DNS is still efficient at returning the updated results when polled, as long as the ...
- research-articleJanuary 2019
Dynamically Detecting Security Threats and Updating a Signature-Based Intrusion Detection System’s Database
Procedia Computer Science (PROCS), Volume 159, Issue CPages 1507–1516https://doi.org/10.1016/j.procs.2019.09.321AbstractThe electronic attacks that threaten the security of networks and information are increasing, especially during the current rapid electronic revolution. Therefore, it is necessary to use surveillance and protection systems in order to secure ...
- research-articleDecember 2018
Requirements customized recommendation in a decision-making system
ICSENT 2018: Proceedings of the 7th International Conference on Software Engineering and New TechnologiesArticle No.: 22, Pages 1–5https://doi.org/10.1145/3330089.3330122Decision-making requirements differ from one decisionmaker to another, hence the need to study decision-making requirements personalization. Customization is an effective response to the information overload problem by injecting into queries more ...
- research-articleSeptember 2018
Evaluating strategies for forward snowballing application to support secondary studies updates: emergent results
- Katia Romero Felizardo,
- Anderson Y. Iwazaki da Silva,
- Érica Ferreira de Souza,
- Nandamudi L. Vijaykumar,
- Elisa Yumi Nakagawa
SBES '18: Proceedings of the XXXII Brazilian Symposium on Software EngineeringPages 184–189https://doi.org/10.1145/3266237.3266240Context: Secondary studies should be updated from time to time to include new evidence to preserve their value. It is recognized that one search technique to update secondary studies is forward snowballing and that the number of studies identified is ...
- research-articleMarch 2018
Queries-based requirements imprecision study for data warehouse update structural approach
ICIST '18: Proceedings of the 8th International Conference on Information Systems and TechnologiesArticle No.: 5, Pages 1–10https://doi.org/10.1145/3200842.3200851Due to the increasing complexity of Data Warehouse (DW), continuous attention must be paid for evaluation of their quality throughout their design and development [1]. A good requirements model quality may lead to a good DW quality [2]. Various authors ...
- short-paperOctober 2015
On Query-Update Independence for SPARQL
CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge ManagementPages 1675–1678https://doi.org/10.1145/2806416.2806586This paper investigates techniques for detecting independence of SPARQL queries from updates. A query is independent of an update when the execution of the update does not affect the result of the query. Determining independence is especially useful in ...
- research-articleJune 2015
An extensible simulator for bus- and directory-based cache coherence
WCAE '15: Proceedings of the Workshop on Computer Architecture EducationArticle No.: 2, Pages 1–7https://doi.org/10.1145/2795122.2795124One of the most important concepts that must be understood by students of parallel computer architecture is cache coherence. Processors may change the value of shared variables by writing them in their private caches. These changes must be propagated to ...
- posterMay 2015
FlowShadow: a Fast Path for Uninterrupted Packet Processing in SDN Switches
ANCS '15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systemsPages 205–206Updating rules in the flow tables of SDN switches are complex and time-consuming. Therefore, we propose a cache-based scheme (named FlowShadow) to improve the packet processing performance and keep continuous operating while updating rules in the flow ...
- research-articleNovember 2014
Searchable Encryption with Secure and Efficient Updates
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityPages 310–320https://doi.org/10.1145/2660267.2660297Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud storage where a client outsources its files while the (cloud) service provider should search and selectively retrieve those. ...
- ArticleNovember 2013
How to Update Documents Verifiably in Searchable Symmetric Encryption
Proceedings of the 12th International Conference on Cryptology and Network Security - Volume 8257Pages 309–328https://doi.org/10.1007/978-3-319-02937-5_17In a searchable symmetric encryption (SSE) scheme, a client can store encrypted documents to a server in such way that he can later retrieve the encrypted documents which contain a specific keyword, keeping the keyword and the documents secret. In this ...
- ArticleNovember 2013
"Stacking the Deck" Attack on Software Updates: Solution by Distributed Recommendation of Testers
WI-IAT '13: Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02Pages 293–300https://doi.org/10.1109/WI-IAT.2013.123The discussed "Stacking the Deck" attack and our solution are relevant only to software controlled by loosely constituted communities. Developers can change their vision and abandon features that are essential for certain users. Moreover, well funded ...