Sciweavers

9604 search results - page 1890 / 1921
» The Duality of TIme and Information
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 9 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
100
Voted
IJWIS
2007
153views more  IJWIS 2007»
14 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
TC
2008
14 years 9 months ago
The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks. With inherent topology independence and low state mai...
Ming Zhong, Kai Shen, Joel I. Seiferas
INFORMATICALT
2007
171views more  INFORMATICALT 2007»
14 years 9 months ago
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality
The innovations and improvements in digital imaging sensors and scanners, computer modeling, haptic equipments and e-learning technology, as well as the availability of many powerf...
Athanasios D. Styliadis
106
Voted
IPM
2007
139views more  IPM 2007»
14 years 9 months ago
"What is a good digital library?" - A quality model for digital libraries
In this article, we elaborate on the meaning of quality in digital libraries (DLs) by proposing a model that is deeply grounded in a formal framework for digital libraries: 5S (St...
Marcos André Gonçalves, Bárba...
« Prev « First page 1890 / 1921 Last » Next »