Results 21 to 30 of about 11,908 (175)

Development of Use Cases, Part I [PDF]

open access: yes, 2004
For determining requirements and constructs appropriate for a Web query language, or in fact any language, use cases are of essence. The W3C has published two sets of use cases for XML and RDF query languages.
Bolzer, Oliver   +4 more
core   +1 more source

FRBR Review Group initiatives and the world of linked data

open access: yesJLIS.it, 2013
The FRBR Review Group has the mandate to review and maintain IFLA's family of conceptual models and to develop guidelines and interpretive documents to assist in the application of the models. In September 2011 the Aggregates Working Group submitted its
Pat Riva
doaj   +6 more sources

Le iniziative del FRBR Review Group e il mondo Linked data

open access: yesJLIS.it, 2013
The FRBR Review Group has the mandate to review and maintain IFLA's family of conceptual models and to develop guidelines and interpretive documents to assist in the application of the models.
Pat Riva
doaj   +1 more source

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]

open access: yesInformatică economică, 2011
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Silvia TRIF, Adrian VISOIU
doaj  

nsroot: Minimalist Process Isolation Tool Implemented With Linux Namespaces [PDF]

open access: yes, 2016
Data analyses in the life sciences are moving from tools run on a personal computer to services run on large computing platforms. This creates a need to package tools and dependencies for easy installation, configuration and deployment on distributed ...
Bongo, Lars Ailo   +2 more
core   +2 more sources

Internet Identifiers: A Survey of History, Challenges, and Future Perspectives

open access: yesIEEE Access
Identity systems are fundamental to any network, just as a language is shaped by a consistent set of symbols and their interpretation. A network is defined by a consistent set of identities and their usages.
Andrew Babakian   +3 more
doaj   +1 more source

Investigating performance metrics for container-based HPC environments using x86 and OpenPOWER systems

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Container-based High-Performance Computing (HPC) is changing the way computation is performed and reproduced without sacrificing the raw performance compared to hypervisor-assisted virtualization technologies.
Animesh Kuity, Sateesh K. Peddoju
doaj   +1 more source

TrusNet: Peer-to-Peer Cryptographic Authentication [PDF]

open access: yes, 2016
Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages.
Bedard, Adrian, Bedard, Jonathan
core   +1 more source

Coreference detection in XML metadata [PDF]

open access: yes, 2013
Preserving data quality is an important issue in data collection management. One of the crucial issues hereby is the detection of duplicate objects (called coreferent objects) which describe the same entity, but in different ways.
De Tré, Guy   +2 more
core   +1 more source

Web-based interactive registry of the geosensors [PDF]

open access: yesКомпьютерные исследования и моделирование, 2016
Selection and correct applying of the geosensor - the instrument of mineral geothermobarometry is challenging because of the wide variety of existing geosensors on the one hand and the availability of specific requirements for their use on the other.
Stanislav Dmitrievich Ivanov
doaj   +1 more source

Home - About - Disclaimer - Privacy