Sciweavers

1406 search results - page 135 / 282
» Information Flow in Systems with Schedulers
Sort
View
ICDE
2003
IEEE
73views Database» more  ICDE 2003»
15 years 11 months ago
Scalable Application-Aware Data Freshening
Distributed databases and other networked information systems use copies or mirrors to reduce latency and to increase availability. Copies need to be refreshed. In a loosely coupl...
Donald Carney, Sangdon Lee, Stanley B. Zdonik
CSCW
2010
ACM
15 years 6 months ago
Why the plan doesn't hold: a study of situated planning, articulation and coordination work in a surgical ward
Most studies of plans and situated work have applied ethnographic methods and and thus fail to provide any quantitative insight into the extent of this phenomenon. We present a st...
Jakob E. Bardram, Thomas Riisgaard Hansen
COOPIS
1997
IEEE
15 years 1 months ago
Design and Implementation of a Distributed Workflow Enactment Service
Workflows are activities involving the coordinated execution of multiple tasks performed by different processing entities, mostly in distributed heterogeneous environments which a...
Esin Gokkoca, Mehmet Altinel, Ibrahim Cingil, Nesi...
UIST
2006
ACM
15 years 4 months ago
Huddle: automatically generating interfaces for systems of multiple connected appliances
Systems of connected appliances, such as home theaters and presentation rooms, are becoming commonplace in our homes and workplaces. These systems are often difficult to use, in p...
Jeffrey Nichols, Brandon Rothrock, Duen Horng Chau...
DBSEC
2009
124views Database» more  DBSEC 2009»
14 years 11 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn