Sciweavers

501 search results - page 61 / 101
» Simplification of Integrity Constraints for Data Integration
Sort
View
147
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
Gateway: A Message Hub with Store-and-Forward Messaging in Mobile Networks
To obtain good performance in messaging over mobile networks, we have developed a Gateway. Gateway is a message hub that transmits information using store-and-forward messaging an...
Eiko Yoneki, Jean Bacon
ACTAC
2008
94views more  ACTAC 2008»
15 years 3 months ago
Effect Preservation in Transaction Processing in Rule Triggering Systems
Rules provide an expressive means for implementing database behavior: They cope with changes and their ramifications. Rules are commonly used for integrity enforcement, i.e., for ...
Mira Balaban, Steffen Jurk
150
Voted
SIGMOD
2012
ACM
224views Database» more  SIGMOD 2012»
13 years 6 months ago
Tiresias: the database oracle for how-to queries
How-To queries answer fundamental data analysis questions of the form: “How should the input change in order to achieve the desired output”. As a Reverse Data Management probl...
Alexandra Meliou, Dan Suciu
107
Voted
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
15 years 9 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
125
Voted
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
15 years 8 months ago
The Birth of An E-Business System Architecture: Conflicts, Compromises, and Gaps in Methods
This paper describes the system architecture development process in an international ICT company, which is building a comprehensive e-business system for its customers. The implem...
Kari Smolander