• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28
Next 10 →

Realizing the Promise: Government Information Systems and the Fourth Generation of Information Technology

by David Landsbergen Jr , George Wolken Jr - Public Administration Review , 2001
"... Interoperability is more than "digital plumbing"-making sure that computers talk so that bits of data flow properly. Fundamentally, interoperability is people talking and sharing information. Sharing information reduces the "paperwork burden" on the citizen, streamlines work pro ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
information? • Will it be useful, and can I gain that information and its context? GILS was chosen as a case study so that we can begin to understand how meta-data systems support the construction of interoperable systems. What Are the Benefits of Interoperability? As fourth-generation networked technologies

apis 1 -Automatic Production of Information Systems

by M Frappier , B Fraikin , M Richard , R Laleau
"... The objective of the apis research project is to develop a case tool that generates executable information systems (IS) from formal specifications (abstract models). In other words, apis aims at automating as much as possible the production of IS by lifting the level of abstraction at which softwar ..."
Abstract - Add to MetaCart
The objective of the apis research project is to develop a case tool that generates executable information systems (IS) from formal specifications (abstract models). In other words, apis aims at automating as much as possible the production of IS by lifting the level of abstraction at which

Acknowledgements

by Alejandro Houspanossian, Facultad De Ciencias Exactas , 2006
"... First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The spec ..."
Abstract - Add to MetaCart
First, I would like to thank to Dimka Karastoyanova and Mariano Cilia for all the fruitful discussions, their guidance and support through the course of this project. Thanks also to Prof. Alejandro Buchmann who sponsored my stay at Technische Universität Darmstadt during the spring of 2004. The special thanks go to my advisor, Mariano Cilia, who has made all this possible. Finally, I’d like to thank to my family for all these years of support.

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup

J2EE Performance and Scalability- From Measuring to Predicting

by unknown authors
"... Abstract — J2EE applications are becoming increasingly ubiquitous and with their increasing adoption, performance and scalability issues are gaining in importance. For a J2EE application to perform well and be scalable, both the platform on which it is built and the application design must be effici ..."
Abstract - Add to MetaCart
on the selected platforms. In this paper, we present a systematic approach for evaluating and predicting the performance and scalability of J2EE applications based on modeling and simulation. The approach helps to identify and eliminate bottlenecks in the application design and ensure that systems are designed

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reliable, low-cost monitoring of migratory species. The developed multi-tier architecture yields ecologists with unconventional behavior in-formation not furnished by alternative tracking systems at such a large scale and for a low-cost. The simulation, development and implementation of the CraneTracker soft-ware system is presented. The system is shown effective through multiple proxy deploy-

Databases and Distributed Systems Group, TU Darmstadt, Germany,

by Kai Sachs, Samuel Kounev, Jean Bacon, Ro Buchmann
"... Message-oriented middleware (MOM) is at the core of a vast number of financial services and telco applications, and is gaining increasing traction in other industries, such as manufacturing, transportation, health-care and supply chain management. Novel messaging applications, however, pose some ser ..."
Abstract - Add to MetaCart
workload characterization of SPECjms2007 with the goal to help users understand the internal components of the workload and the way they are scaled, ii) we show how the workload can be customized to exercise and evaluate selected aspects of MOM performance, iii) we present a case study of a leading JMS

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Saskatoon By

by Dmytro Dyachuk
"... In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree ..."
Abstract - Add to MetaCart
In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree

Hierarchical Specifications of . . .

by M. Goedicke, P. Tröpfner, B. Enders-Sucrow , 2000
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 28
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University