Sciweavers

603 search results - page 117 / 121
» Agilent's Key Technologies in Remote System Management
Sort
View
FAST
2008
14 years 11 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
CLEF
2008
Springer
14 years 11 months ago
Overview of WebCLEF 2008
We describe the WebCLEF 2008 task. Similarly to the 2007 edition of WebCLEF, the 2008 edition implements a multilingual "information synthesis" task, where, for a given t...
Valentin Jijkoun, Maarten de Rijke
MKWI
2008
135views Business» more  MKWI 2008»
14 years 11 months ago
Ontology-based process mediation in the European project BRITE
: Service-oriented architectures (SOA) are recent architectures enabling interoperable machine-to-machine process interaction by generating a comprehensive view of independent soft...
Ansgar Mondorf, Timo Herborn
89
Voted
INFSOF
2010
100views more  INFSOF 2010»
14 years 8 months ago
Investigating the impact of a measurement program on software quality
Context: Measurement programs have been around for several decades but have been often misused or misunderstood by managers and developers. This misunderstanding prevented their a...
Houari A. Sahraoui, Lionel C. Briand, Yann-Gaë...
75
Voted
CSCW
2004
ACM
14 years 9 months ago
Domestic Routines and Design for the Home
The domestic environment is predicted by market analysts to be the major growth area in computing over the next decade, yet it is a poorly understood domain at the current time of...
Andy Crabtree, Tom Rodden