Sciweavers

14098 search results - page 2626 / 2820
» Crowd computer interaction
Sort
View
GVD
2009
191views Database» more  GVD 2009»
15 years 2 months ago
Query Processing on Multi-Core Architectures
The upcoming generation of computer hardware poses several new challenges for database developers and engineers. Software in general and database management systems (DBMSs) in par...
Frank Huber, Johann Christoph Freytag
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
15 years 2 months ago
High accuracy and language independent document retrieval with a Fast Invariant Transform
This paper presents a tool and a novel Fast Invariant Transform (FIT) algorithm for language independent e-documents access. The tool enables a person to access an e-document thro...
Qiong Liu, Hironori Yano, Don Kimber, Chunyuan Lia...
129
Voted
CCR
2010
128views more  CCR 2010»
15 years 2 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
159
Voted
ENTCS
2010
97views more  ENTCS 2010»
15 years 2 months ago
A Framework for Modelling and Simulating Networks of Cells
Several complex biological phenomena are to be modelled in terms of a large and dynamic network of compartments, where the interplay between inter-compartment and intra-compartmen...
Sara Montagna, Mirko Viroli
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 2 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
« Prev « First page 2626 / 2820 Last » Next »