Sciweavers

4596 search results - page 794 / 920
» Mobile Business Processes
Sort
View
EDBT
2008
ACM
156views Database» more  EDBT 2008»
14 years 9 months ago
Online recovery in cluster databases
Cluster based replication solutions are an attractive mechanism to provide both high-availability and scalability for the database backend within the multi-tier information system...
WeiBin Liang, Bettina Kemme
DEXA
2009
Springer
127views Database» more  DEXA 2009»
14 years 3 months ago
The Real Performance Drivers behind XML Lock Protocols
Abstract. Fine-grained lock protocols should allow for highly concurrent transaction processing on XML document trees, which is addressed by the taDOM lock protocol family enabling...
Sebastian Bächle, Theo Härder
CSCW
2004
ACM
14 years 2 months ago
Lessons from the reMail prototypes
Electronic mail has become the most widely-used application for business productivity and communication, yet many people are frustrated with their email. Though email usage has ch...
Dan Gruen, Steven L. Rohall, Suzanne O. Minassian,...
FC
2004
Springer
89views Cryptology» more  FC 2004»
14 years 2 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eï¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
COMPSAC
2003
IEEE
14 years 2 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...