Sciweavers

1830 search results - page 218 / 366
» Implementing a Tamper-Evident Database System
Sort
View
133
Voted
SAC
2009
ACM
15 years 10 months ago
GPU-based computation of distance functions on road networks with applications
We present a GPU-based algorithm for computing discretized distance functions on road networks. As applications, we provide algorithms for computing discrete Order-k Network Voron...
Marta Fort, Joan Antoni Sellarès
164
Voted
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 10 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
113
Voted
ADC
2009
Springer
141views Database» more  ADC 2009»
15 years 10 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner
129
Voted
DEXA
2009
Springer
201views Database» more  DEXA 2009»
15 years 10 months ago
Dynamic Query Processing for P2P Data Services in the Cloud
With the trend of cloud computing, data and computing are moved away from desktop and are instead provided as a service from the cloud. Data-as-a-service enables access to a wealth...
Pawel Jurczyk, Li Xiong
124
Voted
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
15 years 10 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...