Sciweavers

1830 search results - page 238 / 366
» Implementing a Tamper-Evident Database System
Sort
View
GI
1997
Springer
15 years 4 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
126
Voted
COOTS
1997
15 years 2 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
94
Voted
ICALT
2003
IEEE
15 years 6 months ago
A Conformance Test Suite of Localized LOM Model
Since the approval of IEEE LOM Draft Standard and the advance of network-driven learning technology, a large number of resource database constructors, content developers and learn...
Xin Xiang, Yuanchun Shi, Ling Guo
AISC
2010
Springer
15 years 5 months ago
Towards MKM in the Large: Modular Representation and Scalable Software Architecture
Abstract. MKM has been defined as the quest for technologies to manage mathematical knowledge. MKM “in the small” is well-studied, so the real problem is to scale up to large,...
Michael Kohlhase, Florian Rabe, Vyacheslav Zholude...
101
Voted
ISSS
1999
IEEE
87views Hardware» more  ISSS 1999»
15 years 5 months ago
Exploration and Synthesis of Dynamic Data Sets in Telecom Network Applications
We present a new exploration and optimization method to select customized implementations for dynamic data sets, as encountered in telecom network, database and multimedia applica...
Chantal Ykman-Couvreur, J. Lambrecht, Diederik Ver...