Sciweavers

2135 search results - page 372 / 427
» Supporting Unconstrained Interaction with Application Sharin...
Sort
View
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
WEBI
2004
Springer
15 years 3 months ago
An Integrated Approach to Discovery in Complex Information Spaces
As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Daryl H. Hepting, Cory J. Butz
IEEEPACT
2008
IEEE
15 years 4 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
IMC
2009
ACM
15 years 4 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...
SIGMOD
2001
ACM
118views Database» more  SIGMOD 2001»
15 years 10 months ago
Proxy-Server Architectures for OLAP
Data warehouses have been successfully employed for assisting decision making by offering a global view of the enterprise data and providing mechanisms for On-Line Analytical proc...
Panos Kalnis, Dimitris Papadias