Sciweavers

13822 search results - page 2490 / 2765
» Models in Knowledge Management
Sort
View
135
Voted
ICFEM
2004
Springer
15 years 10 months ago
Verifying a File System Implementation
Abstract. We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed...
Konstantine Arkoudas, Karen Zee, Viktor Kuncak, Ma...
118
Voted
INEX
2004
Springer
15 years 10 months ago
Component Ranking and Automatic Query Refinement for XML Retrieval
Queries over XML documents challenge search engines to return the most relevant XML components that satisfy the query concepts. In a previous work[6] we described an algorithm to ...
Yosi Mass, Matan Mandelbrod
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
177
Voted
MHCI
2004
Springer
15 years 10 months ago
Personalization-Based Optimization of Web Interfaces for Mobile Devices
Developing personalized applications for the ubiquitous Web assumes to provide different user interfaces addressing heterogeneous capabilities of device classes. Major problems are...
Michael Hinz, Zoltán Fiala, Frank Wehner
MIDDLEWARE
2004
Springer
15 years 10 months ago
A hierarchical process execution support for grid computing
Grid is an emerging infrastructure used to share resources among virtual organizations in a seamless manner and to provide breakthrough computing power at low cost. Nowadays there...
Fábio R. L. Cicerre, Edmundo Roberto Mauro ...
« Prev « First page 2490 / 2765 Last » Next »