Sciweavers

2309 search results - page 453 / 462
» Using Meta-Structures in Database Design
Sort
View
IFIP
2001
Springer
13 years 11 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
VLDB
2001
ACM
97views Database» more  VLDB 2001»
13 years 11 months ago
Functional Properties of Information Filtering
In recent years, due to the increasing popularization of data broadcasting, the volume and variety of data being broadcast are rapidly increasing. In this environment, as it is di...
Rie Sawai, Masahiko Tsukamoto, Yin-Huei Loh, Tsuto...
COMPSAC
1998
IEEE
13 years 11 months ago
Allocating Data Objects to Multiple Sites for Fast Browsing of Hypermedia Documents
Many world wide web applications require access, transfer, and synchronization of large multimedia data objects (MDOs) (such as, audio, video, and images) across the communication...
Siu-Kai So, Ishfaq Ahmad, Kamalakar Karlapalem
RTSS
1997
IEEE
13 years 11 months ago
More optimism about real-time distributed commit processing
In [6], we proposed a new commit protocol, OPT, specially designed for use in distributed firm-deadline real-time database systems. OPT allows transactions to “optimistically...
Ramesh Gupta, Jayant R. Haritsa, Krithi Ramamritha...
SIGDOC
1997
ACM
13 years 11 months ago
Usability Studies of WWW Sites: Heuristic Evaluation vs. Laboratory Testing
This paper describes the strengths and weaknesses of two usability assessment methods frequently applied to web sites. It uses case histories of WWW usability studies conducted by...
Laurie Kantner, Stephanie Rosenbaum