Sciweavers

1890 search results - page 322 / 378
» Querying Big Data by Accessing Small Data
Sort
View
BMCBI
2008
151views more  BMCBI 2008»
14 years 11 months ago
CMKb: a web-based prototype for integrating Australian Aboriginal customary medicinal plant knowledge
Background: The customary medicinal plant knowledge possessed by the Australian Aboriginal people is a significant resource. Published information on it is scattered throughout th...
Jitendra Gaikwad, Varun Khanna, Subramanyam Vemulp...
85
Voted
SAC
2004
ACM
15 years 4 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 3 months ago
Automatic contention detection and amelioration for data-intensive operations
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
15 years 5 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
GLOBECOM
2010
IEEE
14 years 8 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...