Sciweavers

4218 search results - page 557 / 844
» Complete sets of cooperations
Sort
View
102
Voted
EDBT
2008
ACM
156views Database» more  EDBT 2008»
16 years 28 days ago
Online recovery in cluster databases
Cluster based replication solutions are an attractive mechanism to provide both high-availability and scalability for the database backend within the multi-tier information system...
WeiBin Liang, Bettina Kemme
134
Voted
PERCOM
2007
ACM
16 years 12 days ago
Context Aware Routing of Enterprise User Communications
This paper develops a context aware framework to address the diverse communication needs of a modern enterprise. Such enterprises are characterized by workers in different locatio...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
ICCAD
2006
IEEE
304views Hardware» more  ICCAD 2006»
15 years 9 months ago
Trunk decomposition based global routing optimization
We present global routing optimization methods which are not based on rip-up and re-route framework. In particular, the routing optimization is based on trunk decomposition [13] o...
Devang Jariwala, John Lillis
108
Voted
CCS
2009
ACM
15 years 7 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
106
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 7 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...