Sciweavers

2814 search results - page 561 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
EDOC
2003
IEEE
13 years 11 months ago
Towards a Language for Coherent Enterprise Architecture Descriptions
A coherent description of architectures provides insight, enables communication among different stakeholders and guides complicated (business and ICT) change processes. Unfortunat...
Henk Jonkers, René van Buuren, Farhad Arbab...
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
13 years 11 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
ISMAR
2003
IEEE
13 years 11 months ago
Resolving Multiple Occluded Layers in Augmented Reality
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
SIGCOMM
2010
ACM
13 years 6 months ago
c-Through: part-time optics in data centers
Data-intensive applications that operate on large volumes of data have motivated a fresh look at the design of data center networks. The first wave of proposals focused on designi...
Guohui Wang, David G. Andersen, Michael Kaminsky, ...
JSS
2007
121views more  JSS 2007»
13 years 5 months ago
Opportunistic prioritised clustering framework for improving OODBMS performance
In object oriented database management systems, clustering has proven to be one of the most effective performance enhancement techniques. Existing clustering algorithms are mainly...
Zhen He, Richard Lai, Alonso Marquez, Stephen Blac...