Sciweavers

928 search results - page 114 / 186
» Safety management of complex technology
Sort
View
DOLAP
2009
ACM
15 years 4 months ago
A taxonomy of ETL activities
Extract-Transform-Load (ETL) activities are software modules responsible for populating a data warehouse with operational data, which have undergone a series of transformations on...
Panos Vassiliadis, Alkis Simitsis, Eftychia Baikou...
CCGRID
2008
IEEE
15 years 4 months ago
Deploying on the Grid with DeployWare
In this paper, we present DeployWare to address the deployment of distributed and heterogeneous software systems on large scale infrastructures such as grids. Deployment of softwa...
Areski Flissi, Jérémy Dubus, Nicolas...
HICSS
2008
IEEE
91views Biometrics» more  HICSS 2008»
15 years 4 months ago
Governance Structures in Cross-Boundary Information Sharing: Lessons from State and Local Criminal Justice Initiatives
Governments are increasingly using collaborative, cross-boundary strategies to face complex social problems. Many of these cross-boundary initiatives have at their core the use, a...
Theresa A. Pardo, José Ramón Gil-Gar...
EGOV
2007
Springer
15 years 4 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
INTERSENSE
2006
ACM
15 years 3 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...