Sciweavers

2512 search results - page 258 / 503
» Software Transactional Memory
Sort
View
JSW
2007
141views more  JSW 2007»
15 years 4 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
SOCA
2010
IEEE
15 years 2 months ago
Short-term performance management by priority-based queueing
Service-based IT infrastructures serve many different business processes on a shared infrastructure in parallel. The automated request execution on the interconnected software com...
Christian Markl, Oliver Hühn, Martin Bichler
IJNSEC
2010
146views more  IJNSEC 2010»
14 years 11 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
KDD
2002
ACM
140views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining frequent item sets by opportunistic projection
In this paper, we present a novel algorithm OpportuneProject for mining complete set of frequent item sets by projecting databases to grow a frequent item set tree. Our algorithm ...
Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han
QEST
2008
IEEE
15 years 11 months ago
Characterization of the E-commerce Storage Subsystem Workload
This paper characterizes the workload seen at the storage subsystem of an e-commerce system. Measurements are conducted on multi-tiered systems running three different benchmarks,...
Xi Zhang, Alma Riska, Erik Riedel