Sciweavers

107 search results - page 19 / 22
» How Much Middle-Tier Do You Need
Sort
View
HICSS
2005
IEEE
169views Biometrics» more  HICSS 2005»
14 years 2 months ago
Developing E-Government Integrated Infrastructures: A Case Study
The Public Domain (PD) always serves as an agent to provide better and reliable services and information to citizens. Recent advancements in technology, citizen-demand and new pub...
Marinos Themistocleous, Zahir Irani, Peter E. D. L...
WIKIS
2006
ACM
14 years 2 months ago
Translation the Wiki way
This paper discusses the design and implementation of processes and tools to support the collaborative creation and maintenance of multilingual wiki content. A wiki is a website w...
Alain Désilets, Lucas Gonzalez, Séba...
EUROSYS
2009
ACM
14 years 5 months ago
Migrating server storage to SSDs: analysis of tradeoffs
Recently, flash-based solid-state drives (SSDs) have become standard options for laptop and desktop storage, but their impact on enterprise server storage has not been studied. P...
Dushyanth Narayanan, Eno Thereska, Austin Donnelly...
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 1 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
CSREASAM
2006
13 years 10 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson