Sciweavers

2006 search results - page 202 / 402
» Systematic Component Adaptation
Sort
View
132
Voted
CIDR
2003
150views Algorithms» more  CIDR 2003»
15 years 5 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann
95
Voted
ICSOC
2009
Springer
15 years 10 months ago
Engage: Engineering Service Modes with WS-Engineer and Dino
In this demonstration1 we present an approach to engineering service brokering requirements and capabilities using the concepts of Service Modes. The demonstration illustrates buil...
Howard Foster, Arun Mukhija, David S. Rosenblum, S...
135
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...
124
Voted
DAC
2002
ACM
16 years 4 months ago
Communication architecture based power management for battery efficient system design
Communication-based power management (CBPM) is a new batterydriven system-level power management methodology in which the systemlevel communication architecture regulates the exec...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan
103
Voted
WWW
2009
ACM
16 years 4 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong