Sciweavers

706 search results - page 63 / 142
» Clone-Aware Configuration Management
Sort
View
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 11 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
WSC
2007
15 years 7 months ago
Using event simulation to evaluate internet protocol enhancements for special services
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...
148
Voted
EUROPAR
2008
Springer
15 years 6 months ago
Complementarity between Virtualization and Single System Image Technologies
Nowadays, the use of clusters in research centers or industries is undeniable. Since few years, the usage of virtual machines (VM) offers more advanced resource management capabili...
Jérôme Gallard, Geoffroy Vallé...
SRDS
1998
IEEE
15 years 9 months ago
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects
Dependable distributed systems are difficult to build. This is particularly true if they have dependability requirements that change during the execution of an application, and are...
Michel Cukier, Jennifer Ren, Chetan Sabnis, David ...
98
Voted
MTSR
2007
Springer
15 years 11 months ago
An RDF modification protocol, based on the needs of editing Tools
 The use of RDF on the web is increasing, unfortunately the amount  of editing tools suitable for end users without knowledge of technicalities of  the la...
Fredrik Enoksson, Matthias Palmér, Ambj&oum...