Sciweavers

1830 search results - page 232 / 366
» Implementing a Tamper-Evident Database System
Sort
View
DASFAA
2007
IEEE
162views Database» more  DASFAA 2007»
15 years 1 months ago
Framework for Extending RFID Events with Business Rule
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...
102
Voted
ESWA
2006
78views more  ESWA 2006»
15 years 1 months ago
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
A system to prevent subscription fraud in fixed telecommunications with high impact on long-distance carriers is proposed. The system consists of a classification module and a pre...
Pablo A. Estévez, Claudio M. Held, Claudio ...
EDBT
2009
ACM
218views Database» more  EDBT 2009»
15 years 7 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
105
Voted
SC
1995
ACM
15 years 4 months ago
Performance of a Parallel Global Atmospheric Chemical Tracer Model
As part of a NASA HPCC Grand Challenge project, we are designing and implementing a parallel atmospheric chemical tracer model that will be suitable for use in global simulations....
James Demmel, Sharon Smith
172
Voted
HPCA
2011
IEEE
14 years 4 months ago
Beyond block I/O: Rethinking traditional storage primitives
Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have deļ¬...
Xiangyong Ouyang, David W. Nellans, Robert Wipfel,...