Sciweavers

666 search results - page 104 / 134
» A Practical Approach to Access Heterogeneous and Distributed...
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
13 years 10 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 10 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
HPDC
2002
IEEE
14 years 1 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
TWC
2010
13 years 3 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
HUC
2005
Springer
14 years 2 months ago
Fast and Robust Interface Generation for Ubiquitous Applications
Abstract. We present Supple, a novel toolkit which automatically generates interfaces for ubiquitous applications. Designers need only specify declarative models of the interface a...
Krzysztof Gajos, David B. Christianson, Raphael Ho...