Results 41 to 50 of about 15,237 (195)

Graphulo: Linear Algebra Graph Kernels for NoSQL Databases

open access: yes, 2015
Big data and the Internet of Things era continue to challenge computational systems. Several technology solutions such as NoSQL databases have been developed to deal with this challenge.
Bolewski, Jake   +5 more
core   +1 more source

pH1: a transactional middleware for NoSQL [PDF]

open access: yes, 2014
NoSQL databases opt not to offer important abstractions traditionally found in relational databases in order to achieve high levels of scalability and availability: transactional guarantees and strong data consistency.
Coelho, Fábio André Castanheira Luís   +4 more
core   +1 more source

Big Data Model Simulation on a Graph Database for Surveillance in Wireless Multimedia Sensor Networks

open access: yes, 2017
Sensors are present in various forms all around the world such as mobile phones, surveillance cameras, smart televisions, intelligent refrigerators and blood pressure monitors.
Küçükkeçeci, Cihan, Yazıcı, Adnan
core   +1 more source

Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database

open access: yesData Science Journal
With the proliferation of data, relational database management systems face the challenge of managing big volumes of data because of the absence of dynamic data models, high functioning, high scalability, high availability, and low cost.
Hira Lal Bhandari, Roshan Chitrakar
doaj   +1 more source

Market‐Driving Capability: An Empirical Study on Antecedents and Consequences

open access: yesBritish Journal of Management, EarlyView.
Abstract What enables market‐driving behaviour, and is it a worthwhile business strategy? This fundamental question intrigues both managers in firms and researchers in marketing and strategic management, yet surprisingly, it remains underexplored. To this end, we assess the antecedents and consequences of market‐driving capability.
Owais Khan   +2 more
wiley   +1 more source

NoSQL Key-Value DBs Riak and Redis [PDF]

open access: yesDatabase Systems Journal, 2016
In the context of today's business needs we must focus on the NoSQL databases because they are the only alternative to the RDBMS that can resolve the modern problems related to storing different data structures, processing continue flows of data and ...
Cristian Andrei BARON
doaj  

Automatic Migration of Data to NoSQL Databases Using Service Oriented Architecture [PDF]

open access: yes, 2015
For the past few years there has been an exponential rise in the use of databases which are not true relational databases. There is no correct definition of such databases but can only be described with a set of common characteristics such absence of a ...
Koshy, Rohan
core  

Assessing NoSQL databases for telecom applications [PDF]

open access: yes, 2011
The constant evolution of access technologies are turning Internet access more ubiquitous, faster, better and cheaper. In connection with the proliferation of Internet access, Cloud Computing is changing the way users look at data, moving from local ...
Cruz, Francisco   +3 more
core   +2 more sources

The Coloniality of Data: Police Databases and the Rationalization of Surveillance from Colonial Vietnam to the Modern Carceral State

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley   +1 more source

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 2, February 2026.
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy