Sciweavers

26354 search results - page 5205 / 5271
» How we refactor, and how we know it
Sort
View
RAID
2004
Springer
15 years 6 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
VLDB
2004
ACM
114views Database» more  VLDB 2004»
15 years 6 months ago
Hardware Acceleration in Commercial Databases: A Case Study of Spatial Operations
Traditional databases have focused on the issue of reducing I/O cost as it is the bottleneck in many operations. As databases become increasingly accepted in areas such as Geograp...
Nagender Bandi, Chengyu Sun, Amr El Abbadi, Divyak...
120
Voted
WCW
2004
Springer
15 years 6 months ago
Distributed Hashtable on Pre-structured Overlay Networks
Internet overlay services must adapt to the substrate network topology and link properties to achieve high performance. A common overlay structure management layer is desirable fo...
Kai Shen, Yuan Sun
CODES
2003
IEEE
15 years 6 months ago
Design space minimization with timing and code size optimization for embedded DSP
One of the most challenging problems in high-level synthesis is how to quickly explore a wide range of design options to achieve high-quality designs. This paper presents an Integ...
Qingfeng Zhuge, Zili Shao, Bin Xiao, Edwin Hsing-M...
EUROMICRO
2003
IEEE
15 years 6 months ago
Web Service Composition Languages: Old Wine in New Bottles?
Recently, several languages for web service composition have emerged (e.g., BPEL4WS and WSCI). The goal of these languages is to glue web services together in a process-oriented w...
Wil M. P. van der Aalst, Marlon Dumas, Arthur H. M...
« Prev « First page 5205 / 5271 Last » Next »