Sciweavers

859 search results - page 138 / 172
» The Changing Face of Cryptography
Sort
View
IKE
2007
14 years 11 months ago
A Set-Theoretic Data Model For Evolving Database Environments
The paper presents an integrated set-theoretic data model that offers a framework for defining a unified schema for any database environment. We utilise the concepts ”entity...
Emmanuel J. Yannakoudakis, Panagiotis Andrikopoulo...
IM
2007
14 years 11 months ago
Server virtualization in autonomic management of heterogeneous workloads
—Server virtualization opens up a range of new possibilities for autonomic datacenter management, through the availability of new automation mechanisms that can be exploited to c...
Malgorzata Steinder, Ian Whalley, David Carrera, I...
NETWORKING
2007
14 years 11 months ago
On-Demand Routing in Disrupted Environments
While current on-demand routing protocols are optimized to take into account unique features of mobile ad hoc networks (MANETs) such as frequent topology changes and limited batter...
Jay Boice, J. J. Garcia-Luna-Aceves, Katia Obraczk...
AIPS
2006
14 years 11 months ago
Incremental Scheduling to Maximize Quality in a Dynamic Environment
We present techniques for incrementally managing schedules in domains where activities accrue quality as a function of the time and resources allocated to them and the goal is to ...
Anthony Gallagher, Terry L. Zimmerman, Stephen F. ...
CIDR
2003
123views Algorithms» more  CIDR 2003»
14 years 11 months ago
A Case for Staged Database Systems
Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasi...
Stavros Harizopoulos, Anastassia Ailamaki