Sciweavers

1465 search results - page 230 / 293
» Making database systems usable
Sort
View
P2P
2005
IEEE
137views Communications» more  P2P 2005»
15 years 8 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
MM
2004
ACM
133views Multimedia» more  MM 2004»
15 years 8 months ago
Interactive retrieval of 3D shape models using physical objects
We present a novel method for interactive retrieval of 3D shapes using physical objects. Our method is based on simple physical 3D interaction with a set of tangible blocks. As th...
Hiroyasu Ichida, Yuichi Itoh, Yoshifumi Kitamura, ...
POLICY
2001
Springer
15 years 7 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
RTSS
1990
IEEE
15 years 6 months ago
Dynamic Real-Time Optimistic Concurrency Control
In a recent study, we have shown that in real-time database systems that discard late transactions, optimistic concurrency control outperforms locking. Although the optimistic alg...
Jayant R. Haritsa, Michael J. Carey, Miron Livny
120
Voted
COMAD
2009
15 years 3 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy