Sciweavers

3474 search results - page 563 / 695
» Data Management in RFID Applications
Sort
View
ICEGOV
2007
ACM
15 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ECIR
2008
Springer
15 years 6 months ago
Clustering Template Based Web Documents
More and more documents on the World Wide Web are based on templates. On a technical level this causes those documents to have a quite similar source code and DOM tree structure. G...
Thomas Gottron
CCGRID
2010
IEEE
15 years 5 months ago
Designing Accelerator-Based Distributed Systems for High Performance
Abstract--Multi-core processors with accelerators are becoming commodity components for high-performance computing at scale. While accelerator-based processors have been studied in...
M. Mustafa Rafique, Ali Raza Butt, Dimitrios S. Ni...
ICSE
2011
IEEE-ACM
14 years 8 months ago
Configuring global software teams: a multi-company analysis of project productivity, quality, and profits
In this paper, we examined the impact of project-level configurational choices of globally distributed software teams on project productivity, quality, and profits. Our analysis u...
Narayan Ramasubbu, Marcelo Cataldo, Rajesh Krishna...
SIGMOD
2011
ACM
331views Database» more  SIGMOD 2011»
14 years 7 months ago
Query optimization techniques for partitioned tables
Table partitioning splits a table into smaller parts that can be accessed, stored, and maintained independent of one another. From their traditional use in improving query perform...
Herodotos Herodotou, Nedyalko Borisov, Shivnath Ba...