Sciweavers

2458 search results - page 271 / 492
» Database-Management Principles And Applications
Sort
View
FTDCS
1999
IEEE
15 years 3 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
ICDCS
1997
IEEE
15 years 3 months ago
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects
—This paper describes algorithms for implementing a high-level programming model for synchronous distributed groupware applications. In this model, several application data objec...
Robert E. Strom, Guruduth Banavar, Kevan Miller, A...
ACMDIS
1997
ACM
15 years 3 months ago
A Teleradiology System Design Case
This paper describes the teleradiology application CHILI from the graphical user interface point of view. We present the most important design decisions taken during the construct...
Erik Borälv, Bengt Göransson
DSONLINE
2008
152views more  DSONLINE 2008»
14 years 11 months ago
Software Architecture Patterns for a Context-Processing Middleware Framework
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Romain Rouvoy, Denis Conan, Lionel Seinturier
SIGMOD
2009
ACM
250views Database» more  SIGMOD 2009»
15 years 11 months ago
Query processing techniques for solid state drives
Solid state drives perform random reads more than 100x faster than traditional magnetic hard disks, while offering comparable sequential read and write bandwidth. Because of their...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...