Sciweavers

6768 search results - page 1200 / 1354
» Developing Applications Using Model-Driven Design Environmen...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
16 years 3 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
133
Voted
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 3 months ago
Locating Mapped Resources in Web 2.0
Abstract-- Mapping mashups are emerging Web 2.0 applications in which data objects such as blogs, photos and videos from different sources are combined and marked in a map using AP...
Anthony K. H. Tung, Beng Chin Ooi, Dongxiang Zhang
ATAL
2009
Springer
15 years 10 months ago
Monitoring social expectations in Second Life
Online virtual worlds such as Second Life provide a rich medium for unstructured human interaction in a shared simulated 3D environment. However, many human interactions take place...
Stephen Cranefield, Guannan Li
152
Voted
DEXA
1998
Springer
179views Database» more  DEXA 1998»
15 years 7 months ago
Concurrent Warehouse Maintenance Without Compromising Session Consistency
Abstract. To achieve acceptable query response times in data warehouse environments, the data have to be pre-aggregated according to the need of the applications and stored redunda...
Michael Teschke, Achim Ulbrich
ICAIL
2007
ACM
15 years 7 months ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond
« Prev « First page 1200 / 1354 Last » Next »