Sciweavers

1830 search results - page 301 / 366
» Implementing a Tamper-Evident Database System
Sort
View
144
Voted
DBISP2P
2004
Springer
162views Database» more  DBISP2P 2004»
15 years 6 months ago
CISS: An Efficient Object Clustering Framework for DHT-Based Peer-to-Peer Applications
Distributed Hash Tables (DHTs) have been widely adopted in many Internet-scale P2P systems. Emerging P2P applications such as massively multi player online games (MMOGs) and P2P ca...
Jinwon Lee, Hyonik Lee, Seungwoo Kang, Sungwon Pet...
HT
1998
ACM
15 years 4 months ago
Enforcing Strong Object Typing in Flexible Hypermedia
The presentation layer of hypermedia systems could benefit from standard object querying functionality and this is most effective if strong typing is enforced. By strong typing we...
Pedro Furtado, Henrique Madeira
INFOSCALE
2007
ACM
15 years 2 months ago
SDI: a swift tree structure for multi-dimensional data indexing in peer-to-peer networks
Efficient multi-dimensional data search has received much attention in centralized systems. However, its implementation in large-scale distributed systems is not a trivial job and...
Rong Zhang, Weining Qian, Minqi Zhou, Aoying Zhou
91
Voted
CASCON
1997
98views Education» more  CASCON 1997»
15 years 2 months ago
Similarity-based retrieval for diverse bookshelf software repository users
The paper presents a similarity-based retrieval framework for a software repository that aids the process of maintaining, understanding, and migrating legacy software systems [12]...
Igor Jurisica
113
Voted
IQ
1996
15 years 2 months ago
Data Quality in Practice: Experience from the Front Line
Information, stored in databases, is a key competitive advantage of many companies. However, this importance does not imply that managers will view data as a strategic resource or...
Christopher P. Firth