Sciweavers

3474 search results - page 131 / 695
» Data Management in RFID Applications
Sort
View
ICDIM
2009
IEEE
15 years 10 months ago
A new hybrid schema-sharing technique for multitenant applications
This paper presents a new schema-sharing technique for multitenant applications. Our approach is built on top of the Extension table method and makes use of the native XML data su...
Franclin S. Foping, Ioannis M. Dokas, John Feehan,...
ICASSP
2008
IEEE
15 years 10 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
CAISE
2006
Springer
15 years 7 months ago
Aligning Software Architectures of Mobile Applications on Business Requirements
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system ...
Volker Gruhn, André Köhler
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 7 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...