Sciweavers

1830 search results - page 238 / 366
» Implementing a Tamper-Evident Database System
Sort
View
GI
1997
Springer
15 years 8 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
COOTS
1997
15 years 5 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
ICALT
2003
IEEE
15 years 9 months ago
A Conformance Test Suite of Localized LOM Model
Since the approval of IEEE LOM Draft Standard and the advance of network-driven learning technology, a large number of resource database constructors, content developers and learn...
Xin Xiang, Yuanchun Shi, Ling Guo
AISC
2010
Springer
15 years 9 months ago
Towards MKM in the Large: Modular Representation and Scalable Software Architecture
Abstract. MKM has been defined as the quest for technologies to manage mathematical knowledge. MKM “in the small” is well-studied, so the real problem is to scale up to large,...
Michael Kohlhase, Florian Rabe, Vyacheslav Zholude...
ISSS
1999
IEEE
87views Hardware» more  ISSS 1999»
15 years 8 months ago
Exploration and Synthesis of Dynamic Data Sets in Telecom Network Applications
We present a new exploration and optimization method to select customized implementations for dynamic data sets, as encountered in telecom network, database and multimedia applica...
Chantal Ykman-Couvreur, J. Lambrecht, Diederik Ver...