Sciweavers

7134 search results - page 1188 / 1427
» A comparative study of map use
Sort
View
CHI
2005
ACM
16 years 4 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
HPCA
2003
IEEE
16 years 4 months ago
Hierarchical Backoff Locks for Nonuniform Communication Architectures
This paper identifies node affinity as an important property for scalable general-purpose locks. Nonuniform communication architectures (NUCAs), for example CCNUMAs built from a f...
Zoran Radovic, Erik Hagersten
VLDB
2008
ACM
141views Database» more  VLDB 2008»
16 years 4 months ago
Deploying and managing Web services: issues, solutions, and directions
Web services are expected to be the key technology in enabling the next installment of the Web in the form of the Service Web. In this paradigm shift, Web services would be treated...
Qi Yu, Xumin Liu, Athman Bouguettaya, Brahim Medja...
EDBT
2006
ACM
182views Database» more  EDBT 2006»
16 years 4 months ago
On High Dimensional Skylines
In many decision-making applications, the skyline query is frequently used to find a set of dominating data points (called skyline points) in a multidimensional dataset. In a high-...
Chee Yong Chan, H. V. Jagadish, Kian-Lee Tan, Anth...
EDBT
2006
ACM
136views Database» more  EDBT 2006»
16 years 4 months ago
Optimizing Monitoring Queries over Distributed Data
Scientific data in the life sciences is distributed over various independent multi-format databases and is constantly expanding. We discuss a scenario where a life science research...
Frank Neven, Dieter Van de Craen
« Prev « First page 1188 / 1427 Last » Next »