Sciweavers

1890 search results - page 73 / 378
» Querying Big Data by Accessing Small Data
Sort
View
HOTOS
2003
IEEE
15 years 4 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
KDD
1995
ACM
140views Data Mining» more  KDD 1995»
15 years 2 months ago
Discovery and Maintenance of Functional Dependencies by Independencies
For semantic query optimization one needs detailed knowledgeabout the contents of the database. Traditional techniquesuse static knowledgeabout all possible states of the database...
Siegfried Bell
84
Voted
CHI
2005
ACM
15 years 11 months ago
AppLens and launchTile: two designs for one-handed thumb use on small devices
We present two interfaces to support one-handed thumb use for PDAs and cell phones. Both use Scalable User Interface (ScUI) techniques to support multiple devices with different r...
Amy K. Karlson, Benjamin B. Bederson, John SanGiov...
SAC
2010
ACM
15 years 6 months ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...
HUC
2003
Springer
15 years 4 months ago
liquid: Context-Aware Distributed Queries
Abstract. As low-level architectural support for context-aware computing matures, we are ready to explore more general and powerful means of accessing context data. Information req...
Jeffrey Heer, Alan Newberger, Chris Beckmann, Jaso...