Sciweavers

1830 search results - page 251 / 366
» Implementing a Tamper-Evident Database System
Sort
View
170
Voted
SIGMOD
2005
ACM
108views Database» more  SIGMOD 2005»
16 years 28 days ago
Guaranteeing Correctness and Availability in P2P Range Indices
New and emerging P2P applications require sophisticated range query capability and also have strict requirements on query correctness, system availability and item availability. W...
Prakash Linga, Adina Crainiceanu, Johannes Gehrke,...
108
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
DotSlash: handling Web hotspots at dynamic content Web sites
We propose DotSlash, a self-configuring and scalable rescue system, for handling web hotspots at dynamic content web sites. To support load migration for dynamic content, an orig...
Weibin Zhao, Henning Schulzrinne
105
Voted
VLDB
2005
ACM
165views Database» more  VLDB 2005»
15 years 6 months ago
Semantic Adaptation of Schema Mappings when Schemas Evolve
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Cong Yu, Lucian Popa
122
Voted
DILS
2004
Springer
15 years 6 months ago
PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web
Abstract. Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have ...
Alexander Kozlenkov, Michael Schroeder
130
Voted
ISMIS
1997
Springer
15 years 5 months ago
Knowledge-Based Image Retrieval with Spatial and Temporal Constructs
e about image features can be expressed as a hierarchical structure called a Type Abstraction Hierarchy (TAH). TAHs can be generated automatically by clustering algorithms based on...
Wesley W. Chu, Alfonso F. Cardenas, Ricky K. Taira