Sciweavers

773 search results - page 153 / 155
» An iTask Case Study: A Conference Management System
Sort
View
WWW
2009
ACM
14 years 6 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
14 years 19 days ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
EDBT
2010
ACM
208views Database» more  EDBT 2010»
14 years 18 days ago
Stream schema: providing and exploiting static metadata for data stream processing
Schemas, and more generally metadata specifying structural and semantic constraints, are invaluable in data management. They facilitate conceptual design and enable checking of da...
Peter M. Fischer, Kyumars Sheykh Esmaili, Ren&eacu...
IEEEPACT
2007
IEEE
14 years 2 days ago
CacheScouts: Fine-Grain Monitoring of Shared Caches in CMP Platforms
As multi-core architectures flourish in the marketplace, multi-application workload scenarios (such as server consolidation) are growing rapidly. When running multiple application...
Li Zhao, Ravi R. Iyer, Ramesh Illikkal, Jaideep Mo...
DASC
2006
IEEE
13 years 12 months ago
Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters
Blade severs are being increasingly deployed in modern datacenters due to their high performance/cost ratio and compact size. In this study, we document our work on blade server b...
Qinghui Tang, Sandeep K. S. Gupta, Daniel Stanzion...