Sciweavers

2956 search results - page 159 / 592
» Targeted Data Prefetching
Sort
View
107
Voted
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 8 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
ICN
2005
Springer
15 years 8 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
129
Voted
IPPS
1998
IEEE
15 years 7 months ago
Optimizing Data Scheduling on Processor-in-Memory Arrays
In the study of PetaFlop project, Processor-In-Memory array was proposed to be a target architecture in achieving 1015 floating point operations per second computing performance. ...
Yi Tian, Edwin Hsing-Mean Sha, Chantana Chantrapor...
121
Voted
SEKE
1993
Springer
15 years 6 months ago
Recovering Conceptual Data Models is Human-Intensive
1 To handle the complexity of modern software systems, a software comprehension strategy pointing out the al abstraction level is necessary. In this context, the role of technology...
Fabio Abbattista, Filippo Lanubile, Giuseppe Visag...
148
Voted
DEXAW
2007
IEEE
128views Database» more  DEXAW 2007»
15 years 6 months ago
Sharing Data on the Grid using Ontologies and distributed SPARQL Queries
The vision of the Semantic Web is to make Web content machine-readable. To describe data, the Resource Description Framework has been extended with a schema-level and description ...
Andreas Langegger, Martin Blöchl, Wolfram W&o...