Sciweavers

5344 search results - page 167 / 1069
» Privacy-Preserving Set Operations
Sort
View
VLDB
2002
ACM
143views Database» more  VLDB 2002»
15 years 2 months ago
SQL Memory Management in Oracle9i
Complex database queries require the use of memory-intensive operators like sort and hashjoin. Those operators need memory, also referred to as SQL memory, to process their input ...
Benoît Dageville, Mohamed Zaït
SCCC
2007
IEEE
15 years 9 months ago
Managing the QoS of E-Government: Metrics for Large Scale SOA
This paper present a set metrics for evaluating the operative aspects of the E-Government SOA systems, based on technical and economical criteria as they are intended to improve ma...
Mauricio Monsalve
RSCTC
2004
Springer
116views Fuzzy Logic» more  RSCTC 2004»
15 years 8 months ago
Constrained Sums of Information Systems
We study properties of infomorphisms between information systems. In particular, we interpret infomorphisms between information systems in terms of sums with constraints (constrain...
Andrzej Skowron, Jaroslaw Stepaniuk
IPPS
2000
IEEE
15 years 7 months ago
Implementation of Finite Lattices in VLSI for Fault-State Encoding in High-Speed Networks
In this paper the propagation of information about fault states and its implementation in high-speed networks is discussed. The algebraic concept of a lattice partial ordered set ...
Andreas C. Döring, Gunther Lustig
TAPSOFT
1995
Springer
15 years 6 months ago
An Imperative Object Calculus
We develop an imperative calculus of objects that is both tiny and expressive. Our calculus provides a minimal setting in which to study the operational semantics and the typing r...
Martín Abadi, Luca Cardelli