Sciweavers

1045 search results - page 100 / 209
» The Use of Exceptions
Sort
View
ICDE
1999
IEEE
94views Database» more  ICDE 1999»
14 years 9 months ago
Scalable Trigger Processing
Current database trigger systems have extremely limited scalability. This paper proposes a way to develop a truly scalable trigger system. Scalability to large numbers of trigger...
Eric N. Hanson, Chris Carnes, Lan Huang, Mohan Kon...
ECOOP
2009
Springer
14 years 9 months ago
Remote Batch Invocation for Compositional Object Services
Abstract. Because Remote Procedure Calls do not compose efficiently, designers of distributed object systems use Data Transfer and Remote Fac?ade patterns to create large-granulari...
Ali Ibrahim, Yang Jiao, Eli Tilevich, William R. C...
FC
2009
Springer
99views Cryptology» more  FC 2009»
14 years 2 months ago
Optical DNA
Abstract. A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device ...
Deepak Vijaywargi, Dave Lewis, Darko Kirovski
FBIT
2007
IEEE
14 years 2 months ago
A Neurostimulator Design for Long-term Animal Experiments
This article reports on a neural prosthesis stimulation system for long-term use in animal electrical stimulation experiments. The presented system consists of an implantable stim...
Jingai Zhou, Se Joon Woo, Se Ik Park, Seung Woo Le...
PERVASIVE
2007
Springer
14 years 2 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...