Sciweavers

26354 search results - page 5195 / 5271
» How we refactor, and how we know it
Sort
View
JCDL
2006
ACM
143views Education» more  JCDL 2006»
15 years 7 months ago
Categorizing web search results into meaningful and stable categories using fast-feature techniques
When search results against digital libraries and web resources have limited metadata, augmenting them with meaningful and stable category information can enable better overviews ...
Bill Kules, Jack Kustanowitz, Ben Shneiderman
110
Voted
MOBICOM
2006
ACM
15 years 7 months ago
Coverage and connectivity in three-dimensional networks
Although most wireless terrestrial networks are based on twodimensional (2D) design, in reality, such networks operate in threedimensions (3D). Since most often the size (i.e., th...
S. M. Nazrul Alam, Zygmunt J. Haas
SPAA
2006
ACM
15 years 7 months ago
Fault-tolerant semifast implementations of atomic read/write registers
This paper investigates time-efficient implementations of atomic read-write registers in message-passing systems where the number of readers can be unbounded. In particular we st...
Chryssis Georgiou, Nicolas C. Nicolaou, Alexander ...
STORAGESS
2006
ACM
15 years 7 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
15 years 7 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
« Prev « First page 5195 / 5271 Last » Next »