Sciweavers

1830 search results - page 236 / 366
» Implementing a Tamper-Evident Database System
Sort
View
IDEAS
2003
IEEE
76views Database» more  IDEAS 2003»
15 years 6 months ago
E-Learning as a Web Service
E-learning platforms and their functionalities resemble one another to a large extend. Recent standardization efforts in e-learning concentrate on the reuse of learning material, ...
Gottfried Vossen, Peter Westerkamp
80
Voted
SSDBM
2003
IEEE
160views Database» more  SSDBM 2003»
15 years 6 months ago
The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration
It is now common to encounter communities engaged in the collaborative analysis and transformation of large quantities of data over extended time periods. We argue that these comm...
Ian T. Foster
114
Voted
VLDB
1990
ACM
80views Database» more  VLDB 1990»
15 years 4 months ago
Performance Analysis of Disk Arrays under Failure
Disk arrays (RAID) have been proposed as a possible approach to solving the emerging I/O bottleneck problem. The performance of a RAID system when all disks are operational and th...
Richard R. Muntz, John C. S. Lui
87
Voted
DBPL
1991
Springer
92views Database» more  DBPL 1991»
15 years 4 months ago
A Remote Execution Mechanism For Distributed Homogeneous Stable Stores
Persistent languages and systems provide the ability to create and manipulate all data in a uniform manner regardless of how long it persists. Such systems are usually implemented...
Alan Dearle, John Rosenberg, Francis Vaughan
132
Voted
ER
2008
Springer
179views Database» more  ER 2008»
15 years 2 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen