Sciweavers

759 search results - page 65 / 152
» What Can Be Implemented Anonymously
Sort
View
GPC
2009
Springer
13 years 7 months ago
I/O Device Virtualization in the Multi-core era, a QoS Perspective
In this paper, we propose an extension to the I/O device architecture, as recommended in the PCI-SIG IOV specification, for virtualizing network I/O devices. The aim is to enable ...
J. Lakshmi, S. K. Nandy
VLDB
2001
ACM
126views Database» more  VLDB 2001»
14 years 10 months ago
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems
The correctness of the data managed by database systems is vital to any application that utilizes data for business, research, and decision-making purposes. To guard databases agai...
Can Türker, Michael Gertz
OWLED
2007
13 years 11 months ago
SPARQL-DL: SPARQL Query for OWL-DL
There are many query languages (QLs) that can be used to query RDF and OWL ontologies but neither type is satisfactory for querying OWL-DL ontologies. RDF-based QLs (RDQL, SeRQL, S...
Evren Sirin, Bijan Parsia
EJWCN
2011
77views more  EJWCN 2011»
13 years 5 months ago
Emulating Opportunistic Networks with KauNet Triggers
In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. ...
Tanguy Pérennou, Anna Brunstrom, Tomas Hall...
CACM
1998
81views more  CACM 1998»
13 years 9 months ago
Toward a Model of Type Inheritance
rigorous, and abstract— clearly defined and generally agreed—type inheritance model. To quote an article by Taivalsaari: “The basic idea of inheritance is quite simple ... [a...
C. J. Date, Hugh Darwen