Sciweavers

2597 search results - page 506 / 520
» A Relational Approach to Support Software Architecture Analy...
Sort
View
75
Voted
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
15 years 4 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
FOSSACS
2005
Springer
15 years 3 months ago
Mathematical Models of Computational and Combinatorial Structures
The general aim of this talk is to advocate a combinatorial perspective, together with its methods, in the investigation and study of models of computation structures. This, of cou...
Marcelo P. Fiore
ISJ
2008
93views more  ISJ 2008»
14 years 9 months ago
Knowledge transfer in globally distributed teams: the role of transactive memory
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
Ilan Oshri, Paul C. van Fenema, Julia Kotlarsky
MMS
2008
14 years 9 months ago
Canonical processes for creating personalized semantically rich multimedia presentations
Authoring of multimedia content can be considered as composing media assets such as images, videos, text, and audio in time, space, and interaction into a coherent multimedia pres...
Ansgar Scherp
NSPW
2004
ACM
15 years 3 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble