Sciweavers

3984 search results - page 557 / 797
» Using linked data for systems management
Sort
View
PUC
2000
106views more  PUC 2000»
15 years 1 months ago
The Shopping Jacket: Wearable Computing for the Consumer
As part of the Bristol Wearable Computing Initiative we are exploring location sensing systems suitable for use with Wearable Computing. In this paper we present our ndings, and in...
Cliff Randell, Henk L. Muller
USENIX
2008
15 years 4 months ago
Prefetching with Adaptive Cache Culling for Striped Disk Arrays
Conventional prefetching schemes regard prediction accuracy as important because useless data prefetched by a faulty prediction may pollute the cache. If prefetching requires cons...
Sung Hoon Baek, Kyu Ho Park
SRDS
2003
IEEE
15 years 7 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
AC
1999
Springer
15 years 6 months ago
Integrating Group Communication with Transactions for Implementing Persistent Replicated Objects
A widely used computational model for constructing fault-tolerant distributed applications employs atomic transactions for controlling operations on persistent objects. There has ...
Mark C. Little, Santosh K. Shrivastava
OIR
2010
101views more  OIR 2010»
15 years 11 days ago
Supporting information access in e-learning by integrating digital libraries and ontology
Purpose – The purpose of this paper is to examine the integration of digital library (DL) technologies with ontology-based knowledge representation in providing semantic rich in...
Daqing He, Yefei Peng, Ming Mao, Dan Wu