Sciweavers

220 search results - page 12 / 44
» Exploiting Schemas in Data Synchronization
Sort
View
STEP
2005
IEEE
15 years 5 months ago
Using Metamodels in Service Interoperability
Interoperability in service oriented environments is heavily inuenced by the view that the cooperating services have on their data. e term service for the abstract contract concl...
Andreas Winter, Jürgen Ebert
PODC
2004
ACM
15 years 5 months ago
Bringing practical lock-free synchronization to 64-bit applications
Many lock-free data structures in the literature exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit operating systems an...
Simon Doherty, Maurice Herlihy, Victor Luchangco, ...
ADC
2008
Springer
100views Database» more  ADC 2008»
15 years 1 months ago
UserMap : an Adaptive Enhancing of User-Driven XML-to-Relational Mapping Strategies
As the XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to expl...
Irena Mlynkova, Jaroslav Pokorný
83
Voted
ADC
2009
Springer
134views Database» more  ADC 2009»
15 years 6 months ago
Mobile Information Exchange and Integration: From Query to Application Layer
Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational ...
Van T. K. Tran, Raymond K. Wong, William K. Cheung...
EDBT
2008
ACM
137views Database» more  EDBT 2008»
15 years 12 months ago
Data exchange in the presence of arithmetic comparisons
Data exchange is the problem of transforming data structured under a schema (called source) into data structured under a different schema (called target). The emphasis of data exc...
Foto N. Afrati, Chen Li, Vassia Pavlaki