A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrity Assurance for RESTful XML
[chapter]
2010
Lecture Notes in Computer Science
, but also gives scalable possibilities to perform on-the-fly integrity verification based on the tree structure. ...
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. ...
data accessed over REST with an in-data integrity verification. ...
doi:10.1007/978-3-642-16385-2_23
fatcat:zxvhyq7tt5e7dplryoaakeya4m
An Introduction to the e-XML Data Integration Suite
[chapter]
2002
Lecture Notes in Computer Science
This paper describes the e-XML component suite, a modular product for integrating heterogeneous data sources under an XML schema and querying in real-time the integrated information using XQuery, the emerging ...
The e-XML suite provides an efficient way to integrate access to multiple data sources on the Internet or on intranets through XML queries. ...
In XML databases, regular path expressions with Kleene star operators have special importance. XML data have irregular and changing structures. ...
doi:10.1007/3-540-45876-x_20
fatcat:5u7au6r5gjhi3ouaksrehi5imu
Evaluation on Multiple Video Streaming in IEEE 802.11e Multihop Networks
2012
Journal of Networks
Evaluation results show that the performance of multi-stream video transmission depends on many factors, including data rates and coding structures of video sequences, traffic assignment mechanism, data ...
In this paper, multiple video streaming in IEEE 802.11e multihop networks is evaluated under different conditions to find out how to design an adaptive cross-layer video transmission scheme for multistream ...
data streams. (2) To improve the performance of multipath routing, the better path should be assigned to the video stream with higher data rate. (3) Whether an EDCA modification is suitable for the current ...
doi:10.4304/jnw.7.12.2057-2062
fatcat:vhiktk5nd5dyffciubq44btccu
FastAD
2010
ACM SIGOPS Operating Systems Review
and access entries in the directory. ...
Our contributions include defining on-disk, block-oriented data structures and algorithms for authenticated directories that exceed memory capacity and optimizations that reduce the I/O required to insert ...
and integrity of the data using the identifier, path, and hash. ...
doi:10.1145/1740390.1740401
fatcat:kmu6de3u55eghigtxyfloselju
BioDWH2: an automated graph-based data warehouse and mapping tool
2021
Journal of Integrative Bioinformatics
This article presents BioDWH2, an open-source, graph-based data warehouse and mapping tool, capable of helping researchers with these issues. ...
Data integration plays a vital role in scientific research. ...
All authors have read the journal's Publication ethics and publication malpractice statement available at the journal's website and hereby confirm that they comply with all its parts applicable to the ...
doi:10.1515/jib-2020-0033
pmid:33618440
pmcid:PMC8238471
fatcat:2gxjtpbya5c4fezlpn63czndri
Catching the boat with Strudel
1998
Proceedings of the 1998 ACM SIGMOD international conference on Management of data - SIGMOD '98
The data model underlying Strudel is a semi-structured model of labeled directed graphs. ...
We address two main questions: (1) when does a declarative specification of site structure provide significant benefits, and (2) what are the main advantages provided by the semi-structured data model. ...
data from multiple sources, generating multiple views of a site, modifying a site's structure over time, and enforcing integrity constraints on sites. ...
doi:10.1145/276304.276341
dblp:conf/sigmod/FernandezFKLS98
fatcat:27oaz26cp5bqtoirvv4eugmkhi
Report on the 2nd International Workshop on Data Integration in the Life Sciences
2006
SIGMOD record
They also propose an OLAPinspired structure called the gene signature cube to perform global analysis of multiple experiments.
S. ...
Tools for Legacy Data and Data Integration Solutions. Wrappers are crucial to the task of accessing legacy biological data sources and automatic wrapper generation is an ongoing challenge. K. ...
doi:10.1145/1147376.1147386
fatcat:bvagx3p33rbyzd7dfpqruikc6i
SAMS multi-layout memory
2010
Proceedings of the 24th ACM International Conference on Supercomputing - ICS '10
This level of memory provides both Array of Structures (AoS) and Structure of Arrays (SoA) views for the structured data to the processor, appearing to have maintained multiple layouts for the same data ...
To achieve this, we employ the extended Single-Affiliation Multiple-Stride (SAMS) parallel memory scheme at an appropriate level in the memory hierarchy. ...
limits the SAMS applications, since there are many applications with multiple structured data, which require different internal data layouts for optimal access efficiency. ...
doi:10.1145/1810085.1810111
dblp:conf/ics/GouKG10
fatcat:gec3txijunf7tksrth3pjqojxq
A Restructurable Integrated Circuit for Implementing Programmable Digital Systems
1982
Computer
coordination of processors on multiple RICs, internal memory use as caches or as a member of a virtual memory hierarchy, qeneral topology for interchip communication and external data paths, and a user ...
The goal of this integrated circuit is to apply the large number of gates that are available on a custom designed VLSI IC to the design of a highly flexible integrated circuit . ...
Traditionally, reliability has improved with each increase in the level of integration. ...
doi:10.1109/mc.1982.1653972
fatcat:axo5fu3v4vbkzgiqxb2o3gtplq
Interactive Visualization Techniques for Neurosurgery Planning
[article]
2011
Eurographics State of the Art Reports
A set of multimodal 2D and 3D renderings conveys the relation between the lesion and the various structures at risk and also depicts data uncertainty. ...
Furthermore, the system allows the surgeon to interactively define the access path by clicking in the 3D views as well as to perform distance measurements in 2D and 3D. ...
(Workflow Step 1) First, the initial investigation of the data in combination with an interactive access path specification. ...
doi:10.2312/eg2011/med/013-016
fatcat:2mfipgfofbbxxhsm7dno435d4q
A Visualization Technique for Access Patterns and Link Structures of Web Sites
2010
2010 14th International Conference Information Visualisation
The presented technique constructs link structures using crawler software, and access patterns from access log files. It then integrates them and visualizes by our graph visualization technique. ...
We think that integration of such two visualization techniques is very useful for Web site management, and therefore we are currently studying on visualization of access pattern and link structure on a ...
Data Integration The technique integrates the link structures and Web access patterns. It first matches URLs in the link structure and Web access pattern data. ...
doi:10.1109/iv.2010.11
dblp:conf/iv/KawamotoI10
fatcat:67rdxwbewzfn7lfpzptlbea5bq
BIOZON: a hub of heterogeneous biological data
2006
Nucleic Acids Research
Biozon augments source data with locally derived data such as 5 billion pairwise protein alignments and 8 million structural alignments. ...
Biozon is a unified biological database that integrates heterogeneous data types such as proteins, structures, domain families, protein-protein interactions and cellular pathways, and establishes the relationships ...
Funding to pay the Open Access publication charges for this article was provided by NSF. ...
doi:10.1093/nar/gkj153
pmid:16381854
pmcid:PMC1347515
fatcat:mby4uguo75bdznoywfl7kmwabe
An enhanced security tree to secure cloud data
2017
International Journal of Engineering & Technology
File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers file protection even when the CSPs compromise. ...
Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure ...
The path with higher value offers higher security and path with lower value offers lesser security. ...
doi:10.14419/ijet.v7i1.1.8925
fatcat:fwdcd63ltzcctlt2hb33cvalva
Data Integration for Dynamic and Sustainable Systems Biology Resources: Challenges and Lessons Learned
2010
Chemistry and Biodiversity
Novel contributions of this work include (1) an approach for addressing discrepancies between experiment results and interpreted results and (2) expanding the range of data integration techniques to include ...
We present examples of a variety of data integration problems drawn from our experiences with PATRIC and RBPRC, as well as open research questions related to long term sustainability, and describe the ...
Thanks to Lisa Gunderman for assisting with proofreading and formatting the manuscript. ...
doi:10.1002/cbdv.200900317
pmid:20491070
pmcid:PMC2894471
fatcat:uap2t6ukfzafhix4he54vbancy
Analysis of cost-benefit trade-offs of complex security systems
1997
Security Systems and Nonlethal Technologies for Law Enforcement
PACAIT -Performance and Cost Analysis Integrated Toolsis a prototype tool. ...
The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. ...
Safeguards are associated with both barrier and access control path elements. ...
doi:10.1117/12.265410
fatcat:6kjavzmrl5aujpotcjcq7hxho4
« Previous
Showing results 1 — 15 out of 496,779 results