Sciweavers

434 search results - page 28 / 87
» The Case for Browser Provenance
Sort
View
VLDB
2007
ACM
77views Database» more  VLDB 2007»
14 years 2 months ago
Tracing Lineage Beyond Relational Operators
Tracing the lineage of data is an important requirement for establishing the quality and validity of data. Recently, the problem of data provenance has been increasingly addressed...
Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Pr...
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 1 months ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein
EURONGI
2004
Springer
14 years 11 days ago
Performance of Different Proxy Concepts in UMTS Networks
It is well known that the large round trip time and the highly variable delay in a cellular network may degrade the performance of TCP. Many concepts have been proposed to improve ...
Marc Necker, Michael Scharf, Andreas Weber 0003
ICDE
2000
IEEE
120views Database» more  ICDE 2000»
14 years 10 months ago
Query Planning with Limited Source Capabilities
In information-integration systems, sources may have diverse and limited query capabilities. In this paper we show that because sources have restrictions on retrieving their infor...
Chen Li, Edward Y. Chang
IPPS
2008
IEEE
14 years 3 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee