Sciweavers

3544 search results - page 579 / 709
» Information Security in Open Systems
Sort
View
POPL
2004
ACM
15 years 11 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
SIGMOD
2008
ACM
140views Database» more  SIGMOD 2008»
15 years 11 months ago
Skippy: a new snapshot indexing method for time travel in the storage manager
The storage manager of a general-purpose database system can retain consistent disk page level snapshots and run application programs "back-in-time" against long-lived p...
Ross Shaull, Liuba Shrira, Hao Xu
PIMRC
2008
IEEE
15 years 5 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa
SASO
2008
IEEE
15 years 5 months ago
Semantic Web Based Self-Management for a Pervasive Service Middleware
Self-management is one of the challenges for realizing Ambient Intelligence in pervasive computing. In this paper, we propose and present a semantic web based selfmanagement appro...
Weishan Zhang, Klaus Marius Hansen
72
Voted
DSOM
2007
Springer
15 years 5 months ago
Virtualization-Based Techniques for Enabling Multi-tenant Management Tools
As service providers strive to improve the quality and efficiency of their IT (information technology) management services, the need to adopt a standard set of tools and processes...
Chang-Hao Tsai, Yaoping Ruan, Sambit Sahu, Anees S...