Sciweavers

250 search results - page 50 / 50
» The Design and Implementation of a Mobile Learning Resource
Sort
View
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 5 months ago
FPGA: what's in it for a database?
While there seems to be a general agreement that next years' systems will include many processing cores, it is often overlooked that these systems will also include an increa...
Jens Teubner, René Müller
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
14 years 6 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 9 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
JKM
2007
203views more  JKM 2007»
13 years 5 months ago
Motivation, incentives and organisational culture
Purpose – The purpose of this paper, drawing as it does on earlier research, is to provide the context for a discussion on the use of rewards and recognition programmes in knowl...
Patricia Milne
WWW
2003
ACM
14 years 6 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...