Sciweavers

1830 search results - page 308 / 366
» Implementing a Tamper-Evident Database System
Sort
View
104
Voted
SOSP
2001
ACM
15 years 9 months ago
Anticipatory scheduling: A disk scheduling framework to overcome deceptive idleness in synchronous I/O
Disk schedulers in current operating systems are generally work-conserving, i.e., they schedule a request as soon as the previous request has finished. Such schedulers often requ...
Sitaram Iyer, Peter Druschel
CSE
2009
IEEE
15 years 7 months ago
Information Retrieval in Wikis Using an Ontology
This article addresses a question regarding relevant information in a social media such as a wiki that can contain huge amount of text, written in slang or in natural language, wi...
Carlos Miguel Tobar, Alessandro Santos Germer, Jua...
91
Voted
SEMWEB
2009
Springer
15 years 7 months ago
Towards Integrity Constraints in OWL
In many data-centric applications, it is desirable to use OWL as an expressive schema language with which one expresses constraints that must be satisfied by instance data. Howeve...
Evren Sirin, Jiao Tao
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
15 years 7 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner
HPDC
2008
IEEE
15 years 7 months ago
DataLab: transactional data-parallel computing on an active storage cloud
Active storage clouds are an attractive platform for executing large data intensive workloads found in many fields of science. However, active storage presents new system managem...
Brandon Rich, Douglas Thain