Sciweavers

24529 search results - page 291 / 4906
» Computing on Authenticated Data
Sort
View
COMPUTER
2004
101views more  COMPUTER 2004»
15 years 3 months ago
Crime Data Mining: A General Framework and Some Examples
Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gan...
COMPUTER
1999
63views more  COMPUTER 1999»
15 years 3 months ago
Interactive data Analysis: The Control Project
Joseph M. Hellerstein, Ron Avnur, Andy Chou, Chris...
SBBD
2004
119views Database» more  SBBD 2004»
15 years 5 months ago
Computing the Dependency Basis for Nested List Attributes
Multi-valued dependencies (MVDs) are an important class of constraints that is fundamental for relational database design. Although modern applications increasingly require the su...
Sven Hartmann, Sebastian Link
151
Voted
EUROPAR
2009
Springer
15 years 10 months ago
Provider-Independent Use of the Cloud
Abstract. Utility computing offers researchers and businesses the potential of significant cost-savings in that it is possible for them to match the cost of their computing and s...
Terence J. Harmer, Peter Wright, Christina Cunning...
ACSW
2007
15 years 5 months ago
DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids
Traditional DHT (Distributed Hash Tables) abstraction distributes data items among peer nodes on a structured overlay network. This introduces a number of issues when nodes are un...
Verdi March, Yong Meng Teo, Xianbing Wang