14 resultados para G7824.B4 1865 .Z5
em Boston University Digital Common
Resumo:
http://www.archive.org/details/hawaiianislandsa00peabiala
Resumo:
Handwritten 1865 handwritten letter from Daniel D. Whedon to Daniel A. Whedon, his nephew, regarding slavery in relation to the Church as well as the Christian Union.
Resumo:
http://www.archive.org/details/a592254601marsuoft
Resumo:
http://www.archive.org/details/conquestofcontin00burluoft
Resumo:
http://moa.umdl.umich.edu/cgi/sgml/moa-idx?notisid=ALQ8090
Resumo:
http://www.archive.org/details/briefhistoryofth014373mbp
Resumo:
http://www.archive.org/details/anorientallandof00freeuoft
Resumo:
http://www.archive.org/details/missionabnaquise00bigorich
Resumo:
http://name.umdl.umich.edu/ABB4262
Resumo:
http://www.archive.org/details/cooperationandth009506mbp
Resumo:
http://www.archive.org/details/thesaenkhyaaphor00kapiuoft
The clear sunshine of the gospel breaking forth upon the Indians in New-England / by Thomas Shepard.
Resumo:
http://www.archive.org/details/clearsunshineofg00sheprich
Resumo:
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to access and query the data more efficiently. As servers might be untrusted or can be compromised, query authentication becomes an essential component of ODB systems. Existing solutions for this problem concentrate mostly on static scenarios and are based on idealistic properties for certain cryptographic primitives. In this work, first we define a variety of essential and practical cost metrics associated with ODB systems. Then, we analytically evaluate a number of different approaches, in search for a solution that best leverages all metrics. Most importantly, we look at solutions that can handle dynamic scenarios, where owners periodically update the data residing at the servers. Finally, we discuss query freshness, a new dimension in data authentication that has not been explored before. A comprehensive experimental evaluation of the proposed and existing approaches is used to validate the analytical models and verify our claims. Our findings exhibit that the proposed solutions improve performance substantially over existing approaches, both for static and dynamic environments.