Sciweavers

286 search results - page 50 / 58
» Application-Tailored XML Storage
Sort
View
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 3 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
JCDL
2009
ACM
127views Education» more  JCDL 2009»
14 years 3 months ago
Collecting fragmentary authors in a digital library
This paper discusses new work to represent, in a digital library of classical sources, authors whose works themselves are lost and who survive only where surviving authors quote, ...
Monica Berti, Matteo Romanello, Alison Babeu, Greg...
ICDCSW
2007
IEEE
14 years 2 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira
MTSR
2007
Springer
14 years 2 months ago
A Distributed Architecture for Harvesting Metadata Describing Organizations in the Agriculture Sector
Providing easy access to updated, accurate and semantically meaningful information about organizations working in the agriculture sector is of primary importance in agricultural in...
Valeria Pesce, Maru Ajit, Gauri Salokhe, Johannes ...
XIMEP
2005
ACM
150views Database» more  XIMEP 2005»
14 years 2 months ago
Updating the Pre/Post Plane in MonetDB/XQuery
We outline an efficient ACID-compliant mechanism for structural inserts and deletes in relational XML document storage that uses a region based pre/size/level encoding (equivalent...
Peter A. Boncz, Stefan Manegold, Jan Rittinger