Sciweavers

1830 search results - page 201 / 366
» Implementing a Tamper-Evident Database System
Sort
View
168
Voted
HT
2004
ACM
15 years 9 months ago
Automatic generation of hypertext system repositories: a model driven approach
In this paper, we present a model-driven methodology and toolset for automatic generation of hypertext system repositories. Our code generator, called Bamboo, is based on a Contai...
E. James Whitehead Jr., Guozheng Ge, Kai Pan
128
Voted
DIAL
2004
IEEE
181views Image Analysis» more  DIAL 2004»
15 years 7 months ago
Forensic Handwritten Document Retrieval System
Document storage and retrieval capabilities of the CEDAR-FOX forensic handwritten document examination system are described. The system is designed for automated and semi-automate...
Sargur N. Srihari, Zhixin Shi
157
Voted
BMCBI
2008
122views more  BMCBI 2008»
15 years 3 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
153
Voted
CIKM
2010
Springer
15 years 2 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...
151
Voted
PDCN
2004
15 years 5 months ago
Speculative prefetching of optional locks in distributed systems
We present a family of methods for speeding up distributed locks by exploiting the uneven distribution of both temporal and spatial locality of access behaviour of many applicatio...
Thomas Schöbel-Theuer