Sciweavers

3012 search results - page 493 / 603
» Testing Processes of Web Applications
Sort
View
PODS
2003
ACM
158views Database» more  PODS 2003»
16 years 2 months ago
Computing full disjunctions
Full disjunctions are an associative extension of the outerjoin operator to an arbitrary number of relations. Their main advantage is the ability to maximally combine data from di...
Yaron Kanza, Yehoshua Sagiv
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
16 years 2 months ago
Q-Cop: Avoiding Bad Query Mixes to Minimize Client Timeouts Under Heavy Loads
In three-tiered web applications, some form of admission control is required to ensure that throughput and response times are not significantly harmed during periods of heavy load....
Sean Tozer, Tim Brecht, Ashraf Aboulnaga
PERCOM
2005
ACM
16 years 2 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
GLOBECOM
2009
IEEE
15 years 9 months ago
Model-Based Opportunistic Channel Access in Dynamic Spectrum Access Networks
Abstract—We propose a model-based channel access mechanism for cognitive radio-enabled secondary network, which opportunistically uses the channel of an unslotted primary network...
Manuj Sharma, Anirudha Sahoo, K. D. Nayak
137
Voted
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 9 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...