Sciweavers

8468 search results - page 68 / 1694
» The Technology of Data Stashing
Sort
View
ERCIMDL
2009
Springer
115views Education» more  ERCIMDL 2009»
15 years 4 months ago
Using Semantic Technologies in Digital Libraries - A Roadmap to Quality Evaluation
In digital libraries semantic techniques are often deployed to reduce the expensive manual overhead for indexing documents, maintaining metadata, or caching for future search. Howe...
Sascha Tönnies, Wolf-Tilo Balke
AINA
2008
IEEE
15 years 4 months ago
A Comparison of Virtualization Technologies for HPC
Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computin...
John Paul Walters, Vipin Chaudhary, Minsuk Cha, Sa...
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
15 years 3 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
EUROPAR
2005
Springer
15 years 3 months ago
On the Use of Virtualization and Service Technologies to Enable Grid-Computing
The In-VIGO approach to Grid-computing relies on the dynamic establishment of virtual grids on which application services are instantiated. InVIGO was conceived to enable computati...
Andréa M. Matsunaga, Maurício O. Tsu...
SAT
2005
Springer
133views Hardware» more  SAT 2005»
15 years 3 months ago
Solving Over-Constrained Problems with SAT Technology
Abstract. We present a new generic problem solving approach for overconstrained problems based on Max-SAT. We first define a clausal form formalism that deals with blocks of clau...
Josep Argelich, Felip Manyà