Now showing items 11-14 of 14
Evaluating lock-based protocols for cooperation on XML documents
(Association for Computing Machinery; 1999, 2004)
We discuss four different core protocols for synchronizing access to and modifications of XML document collections. These core protocols synchronize structure traversals and modifications. They are meant to be integrated ...
Index structures for efficiently accessing fuzzy data including cost models and measurements
Recently, the call for database management systems (DBMS) with uncertainty capabilities is getting stronger. Many of the existing approaches to modeling uncertainty in database management systems are based on the theory ...
A Survey Study on Major Technical Barriers Affecting the Decision to Adopt Cloud Services
In the context of cloud computing, risks associated with underlying technologies, risks involving service models and outsourcing, and enterprise readiness have been recognized as potential barriers for the adoption. To ...