Sciweavers

1830 search results - page 237 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICSEA
2006
IEEE
15 years 6 months ago
UbiNet: A Generic and Ubiquitous Service Provider Framework
—In mobile environment, it is very common that mobile devices periodically stay in disconnection mode. In a networked world as today, computer users rely on network services so h...
Jinsuo Zhang, Sumi Helal
114
Voted
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
15 years 5 months ago
Using XML to Facilitate Information Management across Multiple Local Government Agencies
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....
DBPL
1989
Springer
165views Database» more  DBPL 1989»
15 years 4 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
214
Voted
SIGMOD
2008
ACM
162views Database» more  SIGMOD 2008»
16 years 1 months ago
Event queries on correlated probabilistic streams
A major problem in detecting events in streams of data is that the data can be imprecise (e.g. RFID data). However, current state-ofthe-art event detection systems such as Cayuga ...
Christopher Ré, Dan Suciu, Julie Letchner, ...
FMLDO
1999
Springer
137views Database» more  FMLDO 1999»
15 years 5 months ago
Federated Transaction Management with Snapshot Isolation
Federated transaction management (also known as multidatabase transaction management in the literature) is needed to ensure the consistency of data that is distributed across mult...
Ralf Schenkel, Gerhard Weikum, Norbert Weiße...