Search For:

Displaying 1-4 out of 4 total
PNUTS in Flight: Web-Scale Data Serving at Yahoo
Found in: IEEE Internet Computing
By Adam Silberstein,Jianjun Chen,David Lomax,Brad McMillan,Masood Mortazavi,P.P.S. Narayan,Raghu Ramakrishnan,Russell Sears
Issue Date:January 2012
pp. 13-23
Data management for stateful Web applications is extremely challenging. Applications must scale as they grow in popularity, serve their content with low latency on a global scale, and be highly available, even in the face of hardware failures. This need ha...
 
Mobius: unified messaging and data serving for mobile apps
Found in: Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys '12)
By Alexander Shraer, Byung-Gon Chun, Carlo Curino, Raghu Ramakrishnan, Russell Sears, Samuel Madden
Issue Date:June 2012
pp. 141-154
Mobile application development is challenging for several reasons: intermittent and limited network connectivity, tight power constraints, server-side scalability concerns, and a number of fault-tolerance issues. Developers handcraft complex solutions that...
     
A batch of PNUTS: experiences connecting cloud batch and serving systems
Found in: Proceedings of the 2011 international conference on Management of data (SIGMOD '11)
By Adam E. Silberstein, Brian Frank Cooper, Russell Sears, Wenchao Zhou
Issue Date:June 2011
pp. 1101-1112
Cloud data management systems are growing in prominence, particularly at large Internet companies like Google, Yahoo!, and Amazon, which prize them for their scalability and elasticity. Each of these systems trades off between low-latency serving performan...
     
Can machine learning be secure?
Found in: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06)
By Anthony D. Joseph, Blaine Nelson, J. D. Tygar, Marco Barreno, Russell Sears
Issue Date:March 2006
pp. 16-25
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. However, machine learning algorithms themselves can be a target of attack by a...
     
 1