Sciweavers

8468 search results - page 143 / 1694
» The Technology of Data Stashing
Sort
View
CACM
2004
87views more  CACM 2004»
14 years 10 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
CAI
2002
Springer
14 years 9 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston
OTM
2007
Springer
15 years 4 months ago
Realising Context-Sensitive Mobile Messaging
Mobile technologies aim to assist people as they move from place to place going about their daily work and social routines. Established and very popular mobile technologies include...
Jill Freyne, Emil Varga, Daragh Byrne, Alan F. Sme...
DOLAP
2003
ACM
15 years 3 months ago
Using AutoMed metadata in data warehousing environments
Metadata management is an essential factor in data warehousing. In data warehousing environments, data is transformed and integrated into a single database from multiple autonomou...
Hao Fan, Alexandra Poulovassilis
DAWAK
2005
Springer
14 years 12 months ago
Incremental Data Mining Using Concurrent Online Refresh of Materialized Data Mining Views
Abstract. Data mining is an iterative process. Users issue series of similar data mining queries, in each consecutive run slightly modifying either the definition of the mined dat...
Mikolaj Morzy, Tadeusz Morzy, Marek Wojciechowski,...