Sciweavers

124 search results - page 22 / 25
» Adaptive Secure Access to Remote Services
Sort
View
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
13 years 11 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
CCS
2007
ACM
13 years 12 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
SIGUCCS
2004
ACM
13 years 11 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
IPPS
2002
IEEE
13 years 10 months ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 6 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...