Sciweavers

1897 search results - page 163 / 380
» Early application identification
Sort
View
MOBISYS
2005
ACM
16 years 4 months ago
Horde: separating network striping policy from mechanism
Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping syste...
Asfandyar Qureshi, John V. Guttag
SIGMOD
2005
ACM
118views Database» more  SIGMOD 2005»
16 years 5 months ago
A survey of data provenance in e-science
Data management is growing in complexity as largescale applications take advantage of the loosely coupled resources brought together by grid middleware and by abundant storage cap...
Yogesh Simmhan, Beth Plale, Dennis Gannon
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 11 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 10 months ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
CSE
2009
IEEE
15 years 9 months ago
metaViz: Visualizing Computationally Identified Metaphors in Political Blogs
This paper presents metaViz, an online application that uses computational metaphor identification to find conceptual metaphors in political blogs. The application presents those ...
Eric P. S. Baumer, Jordan Sinclair, David Hubin, B...