Results 51 to 60 of about 591,226 (204)

Color Visual Secret Sharing for QR Code with Perfect Module Reconstruction

open access: yesApplied Sciences, 2019
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc.
Tao Liu, Bin Yan, Jeng-Shyang Pan
doaj   +1 more source

Query Dictionary for Frequent Non-Indexed Queries in HTAP Databases

open access: yesIEEE Access, 2022
The increasing demand for the simultaneous transaction and review of the data for either decision making or forecasting has created a need for faster and better Hybrid Transactional/Analytical Processing (HTAP).
Sucharitha Shetty   +2 more
doaj   +1 more source

From transactions to interactions: the value of co-creation processes within online brand consumer communities

open access: yesBusiness Process Management Journal, 2020
PurposeThe aim of this paper is to examine the extent of value co-creation activity that exists in online brand communities. The approach was to use elements of practice theory to analyse the member-to-member Adult Fans of Lego (AFOL) communityDesign/methodology/approachThe method adopted was netnography based on a study of eight LEGO Facebook groups ...
Barry Ardley   +2 more
openaire   +2 more sources

Case Study: Pan-Mass Challenge [PDF]

open access: yes, 2015
The Pan-Mass Challenge (PMC), a nonprofit organization based in Needham, Mass., is the nation's original fundraising bike-a-thon, and today raises more money for charity than any other single athletic fundraising event in the country.

core  

Instant restore after a media failure

open access: yes, 2017
Media failures usually leave database systems unavailable for several hours until recovery is complete, especially in applications with large devices and high transaction volume.
C Mohan   +8 more
core   +1 more source

SISTEM INFORMASI PEMESANAN BARANG PADA BENGKEL TAWAKKAL JAYA BERBASIS WEB

open access: yesSINTECH (Science and Information Technology) Journal, 2018
The Tawakal Jaya workshop previously used paper for data recording, goods ordering transaction, and promotion. This results in the manual system less efficient in saving time.
Lili Rusdiana   +2 more
doaj   +1 more source

Benchmarking the performance of hypervisors on different workloads [PDF]

open access: yes, 2014
Many organizations rely on a heterogeneous set of applications in virtual environment to deliver critical services to their customers. Different workloads utilize system resources at different levels.
Aguiar, Rui L.   +3 more
core  

Application of User-Centered Design Method in E-Commerce Sales System

open access: yesSistemasi: Jurnal Sistem Informasi
E-commerce is the activity of buying and selling goods or services carried out electronically via the internet, involving online transaction, payment and delivery processes.
Retno Tri Amanda, Raissa Amanda Putri
doaj   +1 more source

Proposed framework for enhancing integrity technique using distributed query operation [PDF]

open access: yesBIO Web of Conferences
Database growth and Storage problems are main concern for large and small enterprises nowadays, which significantly influences the efficiency of database applications. Database archiving is one of the solutions available for management.
Farooq Khattak Umar   +3 more
doaj   +1 more source

SQL and NoSQL Database Software Architecture Performance Analysis and Assessments—A Systematic Literature Review

open access: yesBig Data and Cognitive Computing, 2023
The competent software architecture plays a crucial role in the difficult task of big data processing for SQL and NoSQL databases. SQL databases were created to organize data and allow for horizontal expansion. NoSQL databases, on the other hand, support
Wisal Khan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy