Sciweavers

1748 search results - page 302 / 350
» Security Models for Heterogeneous Networking
Sort
View
CHI
2004
ACM
16 years 3 months ago
User profiling
A number of global trends have a large influence on the way we use technology in our life and work, like: ? increasing connectivity and connected devices (any time, any place, any...
Johan Schuurmans, Boris E. R. de Ruyter, Harry van...
204
Voted
VLDB
2007
ACM
108views Database» more  VLDB 2007»
16 years 3 months ago
Update Exchange with Mappings and Provenance
We consider systems for data sharing among heterogeneous peers related by a network of schema mappings. Each peer has a locally controlled and edited database instance, but wants ...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
ATAL
2009
Springer
15 years 9 months ago
Analyzing the performance of randomized information sharing
In large, collaborative, heterogeneous teams, team members often collect information that is useful to other members of the team. Recognizing the utility of such information and d...
Prasanna Velagapudi, Oleg A. Prokopyev, Katia P. S...
RTCSA
2008
IEEE
15 years 9 months ago
Providing Memory QoS Guarantees for Real-Time Applications
Nowadays, systems often integrate a variety of applications whose service requirements are heterogeneous. Consequently, systems must be able to concurrently serve applications whi...
Audrey Marchand, Patricia Balbastre, Ismael Ripoll...
ICDCS
2007
IEEE
15 years 9 months ago
Distributed Slicing in Dynamic Systems
Peer to peer (P2P) systems are moving from application specific architectures to a generic service oriented design philosophy. This raises interesting problems in connection with...
Antonio Fernández, Vincent Gramoli, Ernesto...