Sciweavers

3984 search results - page 747 / 797
» Using linked data for systems management
Sort
View
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
14 years 8 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
ECTEL
2007
Springer
15 years 4 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl
ICS
2003
Tsinghua U.
15 years 3 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ICPR
2002
IEEE
15 years 2 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
ADL
2000
Springer
373views Digital Library» more  ADL 2000»
15 years 2 months ago
BlueView: Virtual Document Servers for Digital Libraries
In the BlueView project, digital library services are developed and partially implemented based on the architecture of virtual document servers. Using standard tools like fulltext...
Andreas Heuer, Holger Meyer, Beate Porst, Patrick ...