Sciweavers

7865 search results - page 1535 / 1573
» Peer-to-Peer Data Management
Sort
View
HICSS
2010
IEEE
166views Biometrics» more  HICSS 2010»
15 years 2 months ago
VrtProf: Vertical Profiling for System Virtualization
As data centers and end users become increasingly reliant on virtualization technology, more efficient and accurate methods of profiling such systems are needed. However, under vir...
Hussam Mousa, Kshitij Doshi, Timothy Sherwood, ElM...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 2 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
SIGIR
1999
ACM
15 years 2 months ago
Comparing the Performance of Database Selection Algorithms
Abstract We compare the performance of two database selection algorithms reported in the literature. Their performance is compared using a common testbed designed specifically for ...
James C. French, Allison L. Powell, James P. Calla...
SIGIR
1999
ACM
15 years 2 months ago
SCAN: Designing and Evaluating User Interfaces to Support Retrieval From Speech Archives
Previous examinations of search in textual archives have assumed that users first retrieve a ranked set of documents relevant to their query, and then visually scan through these ...
Steve Whittaker, Julia Hirschberg, John Choi, Dona...
HOTOS
1999
IEEE
15 years 2 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
« Prev « First page 1535 / 1573 Last » Next »