Results 51 to 60 of about 591,226 (204)
Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj +1 more source
Query Dictionary for Frequent Non-Indexed Queries in HTAP Databases
The increasing demand for the simultaneous transaction and review of the data for either decision making or forecasting has created a need for faster and better Hybrid Transactional/Analytical Processing (HTAP).
Sucharitha Shetty +2 more
doaj +1 more source
PurposeThe aim of this paper is to examine the extent of value co-creation activity that exists in online brand communities. The approach was to use elements of practice theory to analyse the member-to-member Adult Fans of Lego (AFOL) communityDesign/methodology/approachThe method adopted was netnography based on a study of eight LEGO Facebook groups ...
Barry Ardley +2 more
openaire +2 more sources
Case Study: Pan-Mass Challenge [PDF]
The Pan-Mass Challenge (PMC), a nonprofit organization based in Needham, Mass., is the nation's original fundraising bike-a-thon, and today raises more money for charity than any other single athletic fundraising event in the country.
core
Instant restore after a media failure
Media failures usually leave database systems unavailable for several hours until recovery is complete, especially in applications with large devices and high transaction volume.
C Mohan +8 more
core +1 more source
SISTEM INFORMASI PEMESANAN BARANG PADA BENGKEL TAWAKKAL JAYA BERBASIS WEB
The Tawakal Jaya workshop previously used paper for data recording, goods ordering transaction, and promotion. This results in the manual system less efficient in saving time.
Lili Rusdiana +2 more
doaj +1 more source
Benchmarking the performance of hypervisors on different workloads [PDF]
Many organizations rely on a heterogeneous set of applications in virtual environment to deliver critical services to their customers. Different workloads utilize system resources at different levels.
Aguiar, Rui L. +3 more
core
Application of User-Centered Design Method in E-Commerce Sales System
E-commerce is the activity of buying and selling goods or services carried out electronically via the internet, involving online transaction, payment and delivery processes.
Retno Tri Amanda, Raissa Amanda Putri
doaj +1 more source
Proposed framework for enhancing integrity technique using distributed query operation [PDF]
Database growth and Storage problems are main concern for large and small enterprises nowadays, which significantly influences the efficiency of database applications. Database archiving is one of the solutions available for management.
Farooq Khattak Umar +3 more
doaj +1 more source
The competent software architecture plays a crucial role in the difficult task of big data processing for SQL and NoSQL databases. SQL databases were created to organize data and allow for horizontal expansion. NoSQL databases, on the other hand, support
Wisal Khan +5 more
doaj +1 more source

