Sciweavers

43 search results - page 6 / 9
» What Enterprise Architecture and Enterprise Systems Usage Ca...
Sort
View
EDBT
2011
ACM
231views Database» more  EDBT 2011»
12 years 11 months ago
Data integration with dependent sources
Data integration systems offer users a uniform interface to a set of data sources. Previous work has typically assumed that the data sources are independent of each other; however...
Anish Das Sarma, Xin Luna Dong, Alon Y. Halevy
HOTOS
2003
IEEE
14 years 23 days ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
SIGMOD
2008
ACM
297views Database» more  SIGMOD 2008»
15 years 6 months ago
Automatic Virtual Machine Configuration for Database Workloads
Virtual machine monitors are becoming popular tools for the deployment of database management systems and other enterprise software applications. In this paper, we consider a commo...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem, P...
DGO
2003
153views Education» more  DGO 2003»
13 years 8 months ago
Improving Access to Large Volumes of Online Data
The Internet has recently become the medium of interaction with large volumes of data. Enterprises in the public and private sectors made their databases available over the Intern...
Egemen Tanin, Hanan Samet
SEMWEB
2004
Springer
14 years 25 days ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin