Sciweavers

2454 search results - page 415 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IPPS
2000
IEEE
15 years 2 months ago
Autonomous Consistency Technique in Distributed Database with Heterogeneous Requirements
Recently, the diversified types of companies have been trying to cooperate among them to cope with the dynamic market and thus integration of their DBs with heterogeneous requirem...
Hideo Hanamura, Isao Kaji, Kinji Mori
COOPIS
1996
IEEE
15 years 2 months ago
Integrity Constraint Checking in Federated Databases
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
Paul W. P. J. Grefen, Jennifer Widom
EATIS
2007
ACM
15 years 1 months ago
Application layer multicast techniques in grid environments
Resource and service discovery, data transfer or replica management, are some examples of basic operations of a grid which can gain efficiency by using multicast transmission tech...
Rafael Moreno-Vozmediano
DOLAP
2009
ACM
15 years 1 months ago
Defining ETL worfklows using BPMN and BPEL
Decisional systems are crucial for enterprise improvement. They allow the consolidation of heterogeneous data from distributed enterprise data stores into strategic indicators. An...
Zineb El Akkaoui, Esteban Zimányi
COOPIS
2004
IEEE
15 years 1 months ago
Implementing QoS Aware Component-Based Applications
By QoS (Quality of Service), we often refer to a set of quality requirements on the collective behavior of one or more objects. These requirements enable the provision of better se...
Avraam Chimaris, George A. Papadopoulos