Sciweavers

595 search results - page 118 / 119
» Communication architecture based power management for batter...
Sort
View
HICSS
2002
IEEE
78views Biometrics» more  HICSS 2002»
13 years 10 months ago
What Is Effective GSS Facilitation? A Qualitative Inquiry into Participants' Perceptions
Facilitation in GSS meetings is considered among the most important critical success factors for effective GSS application. A considerable amount of research on GSS facilitation h...
Gert-Jan de Vreede, Jessica Boonstra, Fred Niederm...
ICSOC
2009
Springer
13 years 10 months ago
Message-Oriented Middleware with QoS Awareness
Publish/subscribe messaging is a fundamental mechanism for interconnecting disparate services and systems in the service-oriented computing architecture. The quality of services (Q...
Hao Yang, Minkyong Kim, Kyriakos Karenos, Fan Ye, ...
IMC
2010
ACM
13 years 3 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
FPL
2005
Springer
122views Hardware» more  FPL 2005»
13 years 11 months ago
FPGA-Aware Garbage Collection in Java
— During codesign of a system, one still runs into the impedance mismatch between the software and hardware worlds. er identifies the different levels of abstraction of hardware...
Philippe Faes, Mark Christiaens, Dries Buytaert, D...
SACMAT
2003
ACM
13 years 11 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons