Sciweavers

2516 search results - page 473 / 504
» Integrity Constraints for XML
Sort
View
VLDB
2002
ACM
110views Database» more  VLDB 2002»
13 years 8 months ago
Extending an ORDBMS: The StateMachine Module
Extensibility is one of the mayor benefits of object-relational database management systems. We have used this system property to implement a StateMachine Module inside an object-...
Wolfgang Mahnke, Christian Mathis, Hans-Peter Stei...
ISF
2010
109views more  ISF 2010»
13 years 7 months ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...
CASES
2010
ACM
13 years 6 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
JAMIA
2010
116views more  JAMIA 2010»
13 years 3 months ago
Extracting Rx information from clinical narrative
Objective The authors used the i2b2 Medication Extraction Challenge to evaluate their entity extraction methods, contribute to the generation of a publicly available collection of...
James G. Mork, Olivier Bodenreider, Dina Demner-Fu...
JSA
2010
158views more  JSA 2010»
13 years 3 months ago
Scalable mpNoC for massively parallel systems - Design and implementation on FPGA
The high chip-level integration enables the implementation of large-scale parallel processing architectures with 64 and more processing nodes on a single chip or on an FPGA device...
Mouna Baklouti, Yassine Aydi, Philippe Marquet, Je...