Sciweavers

12568 search results - page 2204 / 2514
» Selective user interaction
Sort
View
FAST
2008
15 years 7 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
CONEXT
2005
ACM
15 years 7 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...
MMNS
2007
208views Multimedia» more  MMNS 2007»
15 years 6 months ago
Hybrid Overlay Networks Management for Real-Time Multimedia Streaming over P2P Networks
Recent growth of the multimedia content delivery over the Internet and the popularity of the peer-to-peer (P2P) architecture have opened new horizons for emerging novel services ov...
Mubashar Mushtaq, Toufik Ahmed
ICWS
2004
IEEE
15 years 6 months ago
External Matching in UDDI
As the set of available Web Services expands, it becomes increasingly important to have automated tools to help identify services that match a requester's requirements. Findi...
John Colgrave, Rama Akkiraju, Richard Goodwin
ICHIM
2001
104views more  ICHIM 2001»
15 years 6 months ago
The New Norwegian Rock Art Database
The Rock Art Project was set up by the Directorate for Cultural Heritage on behalf of the Norwegian Ministry of the Environment in 1996. The database was initiated within the EU-s...
Wenche Helliksen, Inger Marie Holm-Olsen, Olaug Ha...
« Prev « First page 2204 / 2514 Last » Next »