Sciweavers

8468 search results - page 1690 / 1694
» The Technology of Data Stashing
Sort
View
JCS
2010
104views more  JCS 2010»
13 years 5 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JIDM
2010
160views more  JIDM 2010»
13 years 5 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JUCS
2010
214views more  JUCS 2010»
13 years 5 months ago
Multi-Device Context-Aware RIAs Using a Model-Driven Approach
: Model-Driven Development concepts are exhibiting as a good engineering solution for the design of ubiquitous applications with multi-device user interfaces and other contextaware...
Marino Linaje Trigueros, Juan Carlos Preciado, Fer...
PVLDB
2010
178views more  PVLDB 2010»
13 years 5 months ago
Hadoop++: Making a Yellow Elephant Run Like a Cheetah (Without It Even Noticing)
MapReduce is a computing paradigm that has gained a lot of attention in recent years from industry and research. Unlike parallel DBMSs, MapReduce allows non-expert users to run co...
Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz, A...
PVLDB
2010
151views more  PVLDB 2010»
13 years 5 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
« Prev « First page 1690 / 1694 Last » Next »