Sciweavers

2514 search results - page 184 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
USS
2008
15 years 4 months ago
Selective Versioning in a Secure Disk System
Making vital disk data recoverable even in the event of OS compromises has become a necessity, in view of the increased prevalence of OS vulnerability exploits over the recent yea...
Swaminathan Sundararaman, Gopalan Sivathanu, Erez ...
SSDBM
2010
IEEE
248views Database» more  SSDBM 2010»
15 years 7 months ago
Client + Cloud: Evaluating Seamless Architectures for Visual Data Analytics in the Ocean Sciences
Science is becoming data-intensive, requiring new software architectures that can exploit resources at all scales: local GPUs for interactive visualization, server-side multi-core ...
Keith Grochow, Bill Howe, Mark Stoermer, Roger S. ...
SIGMOD
2011
ACM
169views Database» more  SIGMOD 2011»
14 years 4 months ago
Coordination through querying in the youtopia system
In a previous paper, we laid out the vision of declarative datadriven coordination (D3C) where users are provided with novel abstractions that enable them to communicate and coord...
Nitin Gupta 0003, Lucja Kot, Gabriel Bender, Sudip...
134
Voted
IJSEKE
2000
111views more  IJSEKE 2000»
15 years 1 months ago
An Approach to Quantitative Software Architecture Sensitivity Analysis
Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of ...
Chung-Horng Lung, Kalai Kalaichelvan
SNPD
2003
15 years 3 months ago
Incomplete Information Processing for Optimization of Distributed Applications
This paper focuses on non-strict processing, optimization, and partial evaluation of MPI programs which use incremental data structures (ISs). We describe the design and implement...
Alfredo Cristóbal-Salas, Andrei Tchernykh, ...