Sciweavers

3077 search results - page 80 / 616
» Design Principles for Application Integration
Sort
View
178
Voted
WWW
2010
ACM
15 years 9 months ago
Web search/browse log mining: challenges, methods, and applications
Huge amounts of search and browse log data has been accumulated in various search engines. Such massive search/browse log data, on the one hand, provides great opportunities to mi...
Daxin Jiang, Jian Pei, Hang Li
111
Voted
CDC
2008
IEEE
161views Control Systems» more  CDC 2008»
15 years 9 months ago
Distributed policies for equitable partitioning: Theory and applications
Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Emilio Frazzoli, Francesco Bullo
104
Voted
HASE
2008
IEEE
15 years 9 months ago
On the Integrity of Lightweight Checkpoints
This paper proposes a lightweight checkpointing scheme for real-time embedded systems. The goal is to separate concerns by allowing applications to take checkpoints independently ...
Raul Barbosa, Johan Karlsson
108
Voted
WIKIS
2006
ACM
15 years 8 months ago
Is there a space for the teacher in a WIKI?
In this paper we ask to what extent collective cognition can be supported and sustained in classroom practices. One major challenge for learning in technology-rich, collaborative ...
Andreas Lund, Ole Smørdal
142
Voted
MIDDLEWARE
2007
Springer
15 years 8 months ago
CAESAR: middleware for complex service-oriented peer-to-peer applications
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These ...
Lipo Chan, Shanika Karunasekera, Aaron Harwood, Eg...