Sciweavers

6844 search results - page 1260 / 1369
» Web Service Security
Sort
View
ICAC
2008
IEEE
15 years 4 months ago
Tailoring Resources: The Energy Efficient Consolidation Strategy Goes Beyond Virtualization
Virtualization and consolidation are two complementary techniques widely adopted in a global strategy to reduce system management complexity. In this paper we show how two simple ...
Jordi Torres, David Carrera, Vicenç Beltran...
ICALT
2008
IEEE
15 years 4 months ago
NOESIS: An Enhanced Educational Environment for Kids with Autism Spectrum Disorders
A novel educational environment for kids with autistic spectrum disorders (ASDs), namely NOESIS, is presented in this paper. NOESIS takes into account ASD kids’ individual chara...
Iason Vittorias, Panagiotis Petrantonakis, Dimitri...
BROADNETS
2007
IEEE
15 years 4 months ago
Assessing the impact of BitTorrent on DOCSIS networks
Abstract— BitTorrent is a widely deployed peer-to-peer protocol that provides scalable file sharing capabilities. While BitTorrent applications contribute to the demand for high...
James J. Martin, James Westall
DSN
2007
IEEE
15 years 4 months ago
Dependability Assessment of Grid Middleware
Dependability is a key factor in any software system due to the potential costs in both time and money a failure may cause. Given the complexity of Grid applications that rely on ...
Nik Looker, Jie Xu
ESCIENCE
2007
IEEE
15 years 4 months ago
GridR: An R-Based Grid-Enabled Tool for Data Analysis in ACGT Clinico-Genomics Trials
In this paper, we describe an analysis tool based on the statistical environment R, GridR, which allows using the collection of methodologies available as R packages in a grid env...
Dennis Wegener, Thierry Sengstag, Stelios Sfakiana...
« Prev « First page 1260 / 1369 Last » Next »