Sciweavers

3031 search results - page 433 / 607
» SNMS - Shadow Network Management System
Sort
View
AICT
2006
IEEE
15 years 10 months ago
Privacy and data protection in technology-enhanced professional learning
Privacy provision and data protection are basic requirements for professional learning, especially when personalized systems are used that adapt to sensitive learner personal data...
Tomaz Klobucar
AICT
2006
IEEE
101views Communications» more  AICT 2006»
15 years 10 months ago
Erasure Codes for Increasing the Availability of Grid Data Storage
In this paper, we describe the design of a highlyavailable Grid data storage system. Increased availability is ensured by data redundancy and file striping. Redundant data is com...
Mikko Pitkänen, Rim Moussa, D. Martin Swany, ...
SKG
2006
IEEE
15 years 10 months ago
A Survey of Cache/Proxy for Transparent Data Replication
Web caching is an important technology for reducing Internet access latency, alleviating network traffic, and spreading server load. An important issue that affects the performa...
Yingwei Jin, Wenyu Qu, Keqiu Li
GLVLSI
2005
IEEE
118views VLSI» more  GLVLSI 2005»
15 years 9 months ago
A continuous time markov decision process based on-chip buffer allocation methodology
We have presented an optimal on-chip buffer allocation and buffer insertion methodology which uses stochastic models of the architecture. This methodology uses finite buffer s...
Sankalp Kallakuri, Nattawut Thepayasuwan, Alex Dob...
MKM
2005
Springer
15 years 9 months ago
Computational Origami of a Morley's Triangle
Abstract. We present a computational origami construction of Morley’s triangles and automated proof of correctness of the generalized Morley’s theorem in a streamlined process ...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin