Sciweavers

3913 search results - page 668 / 783
» complexity 2006
Sort
View
CIKM
2006
Springer
15 years 1 months ago
Heuristic containment check of partial tree-pattern queries in the presence of index graphs
The wide adoption of XML has increased the interest of the database community on tree-structured data management techniques. Querying capabilities are provided through tree-patter...
Dimitri Theodoratos, Stefanos Souldatos, Theodore ...
COMSWARE
2006
IEEE
15 years 1 months ago
Architecting protocol stack optimizations on mobile devices
Applications using traditional protocol stacks (e.g TCP/IP) from wired networks do not function efficiently in mobile wireless scenarios. This is primarily due to the layered archi...
Vijay T. Raisinghani, Sridhar Iyer
ASPLOS
2006
ACM
14 years 12 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
ERCIMDL
2006
Springer
174views Education» more  ERCIMDL 2006»
14 years 12 months ago
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience
Abstract. The digital library field is recently broadening its scope of applicability and it is also continuously adapting to the frequent changes occurring in the internet society...
Giuseppe Amato, Paolo Bolettieri, Franca Debole, F...
APCCM
2006
14 years 11 months ago
Defining and implementing domains with multiple types using mesodata modelling techniques
The integration of data from different sources often leads to the adoption of schemata that entail a loss of information in respect of one or more of the data sets being combined....
Sally Rice, John F. Roddick, Denise de Vries