Sciweavers

8468 search results - page 1690 / 1694
» The Technology of Data Stashing
Sort
View
JCS
2010
104views more  JCS 2010»
14 years 11 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
136
Voted
JIDM
2010
160views more  JIDM 2010»
14 years 11 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JUCS
2010
214views more  JUCS 2010»
14 years 11 months ago
Multi-Device Context-Aware RIAs Using a Model-Driven Approach
: Model-Driven Development concepts are exhibiting as a good engineering solution for the design of ubiquitous applications with multi-device user interfaces and other contextaware...
Marino Linaje Trigueros, Juan Carlos Preciado, Fer...
PVLDB
2010
178views more  PVLDB 2010»
14 years 11 months ago
Hadoop++: Making a Yellow Elephant Run Like a Cheetah (Without It Even Noticing)
MapReduce is a computing paradigm that has gained a lot of attention in recent years from industry and research. Unlike parallel DBMSs, MapReduce allows non-expert users to run co...
Jens Dittrich, Jorge-Arnulfo Quiané-Ruiz, A...
PVLDB
2010
151views more  PVLDB 2010»
14 years 11 months ago
Advanced Processing for Ontological Queries
Ontology-based data access is a powerful form of extending database technology, where a classical extensional database (EDB) is enhanced by an ontology that generates new intensio...
Andrea Calì, Georg Gottlob, Andreas Pieris
« Prev « First page 1690 / 1694 Last » Next »