Sciweavers

3031 search results - page 588 / 607
» SNMS - Shadow Network Management System
Sort
View
BMCBI
2010
138views more  BMCBI 2010»
14 years 12 months ago
A model-independent approach to infer hierarchical codon substitution dynamics
Background: Codon substitution constitutes a fundamental process in molecular biology that has been studied extensively. However, prior studies rely on various assumptions, e.g. r...
Olof Görnerup, Martin Nilsson Jacobi
COMPUTER
2004
105views more  COMPUTER 2004»
14 years 11 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...
SIGOPS
2008
119views more  SIGOPS 2008»
14 years 11 months ago
Project Kittyhawk: building a global-scale computer: Blue Gene/P as a generic computing platform
This paper describes Project Kittyhawk, an undertaking at IBM Research to explore the construction of a nextgeneration platform capable of hosting many simultaneous web-scale work...
Jonathan Appavoo, Volkmar Uhlig, Amos Waterland
CLUSTER
2004
IEEE
14 years 11 months ago
Towards Real-Time Fault-Tolerant CORBA Middleware
An increasing number of applications are being developed using distributed object computing (DOC) middleware, such as CORBA. Many of these applications require the underlying midd...
Aniruddha S. Gokhale, Balachandran Natarajan, Doug...
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi