Filters








87 Hits in 2.7 sec

Distributed database design methodologies

S. Ceri, B. Pernici, G. Wiederhold
1987 Proceedings of the IEEE  
We review the design problems and methodologies along both directions, and we describe DATAID-D, a topdown methodology for distribution design.  ...  The design of distribution can be performed topdown or bottom-up; the first approach is typical of a distributed database developed from scratch, while the second approach is typical of the development  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous referees for providing very useful and detailed comments for revision of this paper.  ... 
doi:10.1109/proc.1987.13771 fatcat:5zi7n6pq6vhijmkvuw7iplhbke

City on the Sky: Flexible, Secure Data Sharing on the Cloud [article]

Dinh Tien Tuan Anh and Wang Wenqiang and Anwitaman Datta
2011 arXiv   pre-print
infrastructure can enable such data sharing both because it can scale easily to an arbitrary volume of data and computation needs on demand, as well as because of natural collocation of diverse such data sets within  ...  the infrastructure.  ...  The proxy maintains a mapping dataID_to_desc, which is a list of: dataID:<host, port, database name> All client requests contain dataIDs.  ... 
arXiv:1108.3915v3 fatcat:stbabx547radho6df5whdse3am

Supporting the Interdisciplinary, Long-Term Research Project 'Patterns in Soil-Vegetation-Atmosphere-Systems' by Data Management Services

Constanze Curdt
2019 Data Science Journal  
To fulfil the scientists' needs and requests with regard to storage, backup, documentation, search and sharing of data with other project members, a project-specific RDM system was designed and implemented  ...  Science conducted in cross-institutional, interdisciplinary, long-term research projects requires active sharing of data, documents and further information.  ...  Acknowledgements The author would like to thank all colleagues involved in designing and implementing the TR32DB over the past years.  ... 
doi:10.5334/dsj-2019-005 fatcat:frig25zbivdfpei6qfjb25mq3y

Knowledge base shipping to the linked open data cloud

Natanael Arndt, Markus Ackermann, Martin Brümmer, Thomas Riechert
2015 Proceedings of the 11th International Conference on Semantic Systems - SEMANTICS '15  
The flexibility of the presented approach further helps maintaining the publication infrastructure for dataset projects.  ...  We are demonstrating and evaluating the presented methodology at the example of the dataset projects DBpedia, Catalogus Professorum Lipsiensium and Sächsisches Pfarrerbuch.  ...  This work was supported by grants from the EU's 7th Framework Programme provided for the projects LIDER (GA no. 610782) and GeoKnow (GA no. 318159).  ... 
doi:10.1145/2814864.2814885 dblp:conf/i-semantics/ArndtABR15 fatcat:45sbagxwyrexpdwbh4yfaldubm

False Data Detection for Fog and Internet of Things Networks

Romano Fantacci, Francesca Nizzi, Tommaso Pecorella, Laura Pierucci, Manuel Roveri
2019 Sensors  
As end devices are mainly resource constrained, Fog Computing (FC) is introduced to implement the DataIDS.  ...  We verify the performance of the proposed DataIDS, implementing a testbed with several devices that measure different physical quantities and by using standard data-gathering protocols.  ...  DataIDS can promptly detect a cyber attack affecting a device of the FC/IoT system as well as effectively isolate it within the network to support the reaction phase.  ... 
doi:10.3390/s19194235 fatcat:f5igtthkore4biftdgiadfbonq

A time-and-value centric provenance model and architecture for medical event streams

Min Wang, Marion Blount, John Davis, Archan Misra, Daby Sow
2007 Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments - HealthNet '07  
An initial design of the provenance storage and querying architecture for this TVC model is also presented.  ...  Unfortunately, existing models of either annotation or process based provenance are designed for transaction-oriented systems and do not satisfy the unique requirements for systems processing high-volume  ...  within designated time intervals in the past.  ... 
doi:10.1145/1248054.1248082 dblp:conf/mobisys/WangBDMS07 fatcat:okjpieknurbrzofjugkv6lj4ye

An open content delivery infrastructure using data lockers

Richard Alimi, Lijiang Chen, Dirk Kutscher, Hongqiang Harry Liu, Akbar Rahman, Haibin Song, Yang Richard Yang, David Zhang, Ning Zong
2012 Proceedings of the second edition of the ICN workshop on Information-centric networking - ICN '12  
Both Internet service providers (ISP) and content delivery network (CDN) providers have deployed in-network resources to assist content distribution, but the existing designs are closed to applications  ...  However, for either ISP or CDN deployed innetwork resources, in the current design, applications have limited Permission to make digital or hard copies of all or part of this work for personal or classroom  ...  Many participants from the IETF DECADE Working Group made contributions to this project.  ... 
doi:10.1145/2342488.2342495 dblp:conf/acmicn/AlimiCKLRSYZZ12 fatcat:rq5oei7d6zfapebwve53xmqioa

A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks [article]

Markos Charalambous, Petros Papagiannis, Antonis Papasavva, Pantelitsa Leonidou, Rafael Constaninou, Lia Terzidou, Theodoros Christophides, Pantelis Nicolaou, Orfeas Theofanis, George Kalatzantonakis, Michael Sirivianos
2020 arXiv   pre-print
In this work, we design and implement a user-centric Family Advice Suite with Guardian Avatars aiming at preserving the privacy of the individuals towards their custodians and towards the advice tool itself  ...  Moreover, we present a systematic process for designing and developing state of the art techniques and a system architecture to prevent minors' exposure to numerous risks and dangers while using Facebook  ...  the CYberSafety II project (Grant Agreement No. 1614254).  ... 
arXiv:2007.12038v2 fatcat:4dtwrktrxrhjhciafp73yc5ddq

A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks

Markos Charalambous, Petros Papagiannis, Antonis Papasavva, Pantelitsa Leonidou, Rafael Constaninou, Lia Terzidou, Theodoros Christophides, Pantelis Nicolaou, Orfeas Theofanis, George Kalatzantonakis, Michael Sirivianos
2020 Zenodo  
In this work, we design and implement a user-centric Family Advice Suite with Guardian Avatars aiming at preserving the privacy of the individuals towards their custodians and towards the advice tool itself  ...  Moreover, we present a systematic process for designing and developing state of the art techniques and a system architecture to prevent minors' exposure to numerous risks and dangers while using Facebook  ...  the CYberSafety II project (Grant Agreement No. 1614254).  ... 
doi:10.5281/zenodo.4022294 fatcat:qil7pq5lifc5thrn4v5hflk25e

Calibration Infrastructure for the GLAST LAT [article]

J. Bogart
2003 arXiv   pre-print
The GLAST LAT calibration infrastructure is designed to accommodate a wide range of time-varying data types, including at a minimum hardware status bits, conversion constants, and alignment for the GLAST  ...  In addition to the "bulk data", each data set will have associated with it a row in a rdbms table containing metadata, such as timestamps, data format, pointer to the location of the bulk data, etc., which  ...  to the design and implementation of the bad strips architecture.  ... 
arXiv:physics/0306096v1 fatcat:2gtejgi2lvaujfq3m46e2yt2pa

Deep Analytics for Management and Cybersecurity of the National Energy Grid [chapter]

Ying Zhao
2020 Lecture Notes in Computer Science  
The smart concept devices including electric automobiles, smart homes and cities, and the Internet of Things (IoT) promise further integration but as the hardware, software, and network infrastructure  ...  In this paper, we demonstrate their potential using the Pecan Street data.  ...  Thanks to the support of the Office of Naval Research for supporting the research, Quantum Intelligence, Inc. for support and collaboration, and the Pecan Street project for providing the data set.  ... 
doi:10.1007/978-3-030-50426-7_23 fatcat:d5ekaqxicjcibpdfgx7dnvcbwa

Light-responsive RFID Tags for Precise Locating of Objects in Manual Assembly Verification Workshops

Bartlomiej Gladysz, Cezary Lysiak
2016 Procedia CIRP  
The problem could be approached by design of shop-floor sensing architecture and application of a set of various sensors, including optical sensors and MEMS.  ...  The main idea of Interactive Manual Assembly Operations for the Human-Centered Workplaces of the Future (INTERACT) project is to utilize workers' knowledge on executing manual assembly tasks and include  ...  project [1] .  ... 
doi:10.1016/j.procir.2015.12.095 fatcat:dn2zx3cexzcupjhogxkrbr52bi

GERBIL

Ricardo Usbeck, Bernd Eickmann, Paolo Ferragina, Christiane Lemke, Andrea Moro, Roberto Navigli, Francesco Piccinno, Giuseppe Rizzo, Harald Sack, René Speck, Raphaël Troncy, Michael Röder (+9 others)
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
The need to bridge between the unstructured data on the Document Web and the structured data on the Web of Data has led to the development of a considerable number of annotation tools.  ...  GERBIL aims to become a focal point for the state of the art, driving the research agenda of the community by presenting comparable objective evaluation results.  ...  fashion, we extended DataID for services.  ... 
doi:10.1145/2736277.2741626 dblp:conf/www/UsbeckRNBBBCCCE15 fatcat:hnpzr4hxu5ajloojkgq2lytkdu

Flexible Component Architecture for Information WEB Portals [chapter]

Łukasz Dutka, Jacek Kitowski
2003 Lecture Notes in Computer Science  
In this paper a proposition of Component-Expert Architecture for designing information Web portals is presented.  ...  Taking advantage of the expert system approach, it introduces a sophisticated method of components management, allowing to reduce complication of software used to build the portals.  ...  The work described in this paper was supported in part by the European Union through the IST-2001-32243 project "CrossGrid". AGH grant is also acknowledged.  ... 
doi:10.1007/3-540-44860-8_65 fatcat:y7z2xza3mbgvjhk4ciujxfotqy

Real-time dissemination of air quality information using data streams and Web technologies: linking air quality to health risks in urban areas / Izvješćivanje o kvaliteti zraka u stvarnom vremenu kontinuiranim prijenosom podataka i web tehnologijama - povezivanje kvalitete zraka sa zdravstvenim rizicima u urbanim sredinama

Silvije Davila, Jadranka Pečar Ilić, Ivan Bešlić
2015 Arhiv za Higijenu Rada i Toksikologiju  
If the parameter values exceed the corresponding regulation limits for three consecutive hours, the web service generates an alert for population groups at risk.  ...  Coupled with the Common Air Quality Index model, our web application brings air pollution information closer to the general population and raises awareness about environmental and health issues.  ...  Data stream management systems vs. traditional Database management systems Traditional database management systems (DBMS) are designed to process datasets that do not change continuously with large data  ... 
doi:10.1515/aiht-2015-66-2633 pmid:26110480 fatcat:t6s43d7tnfdtfcbvxu4y32lpii
« Previous Showing results 1 — 15 out of 87 results