Sciweavers

247 search results - page 29 / 50
» Infrastructure Risk Reduction
Sort
View
SOSP
2003
ACM
15 years 6 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
15 years 3 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
COMPSAC
2003
IEEE
15 years 2 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 2 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
IPPS
2010
IEEE
14 years 7 months ago
On the parallelisation of MCMC-based image processing
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...