Our research explores a new database extension. Our aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and exte...
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
This paper discusses the application of speech alignment, image processing, and language understanding technologies to build efficient interfaces into large digital oral history a...
Michael G. Christel, Julieanna Richardson, Howard ...
Abstract. The aim of this article is to explore and investigate possibilities of reuse already known techniques from object and objectoriented processing for effective processing i...
With the availability of inexpensive blade servers featuring 32 GB or more of main memory, memory-based engines such as the SAP NetWeaver Business Warehouse Accelerator are coming...
Olga Mordvinova, Oleksandr Shepil, Thomas Ludwig 0...