Sciweavers

639 search results - page 112 / 128
» Replication Control for Distributed Real-Time Database Syste...
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
15 years 19 days ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
PET
2004
Springer
14 years 4 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
BMCBI
2008
173views more  BMCBI 2008»
13 years 11 months ago
Gene Vector Analysis (Geneva): A unified method to detect differentially-regulated gene sets and similar microarray experiments
Background: Microarray experiments measure changes in the expression of thousands of genes. The resulting lists of genes with changes in expression are then searched for biologica...
Stephen W. Tanner, Pankaj Agarwal
P2PKM
2004
14 years 9 days ago
Merging G-Grid P2P Systems While Preserving Their Autonomy
Peer-to-Peer (P2P) systems share and manage huge amounts of data and resources distributed across a large number of machines. In pure P2P environments the control is totally decent...
Gianluca Moro, Gabriele Monti, Aris M. Ouksel
HRI
2006
ACM
14 years 4 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...