Sciweavers

410 search results - page 65 / 82
» expert 2010
Sort
View
78
Voted
JPDC
2010
117views more  JPDC 2010»
14 years 8 months ago
Extensible transactional memory testbed
Transactional Memory (TM) is a promising abstraction as it hides all synchronization complexities from the programmers of concurrent applications. More particularly the TM paradig...
Derin Harmanci, Vincent Gramoli, Pascal Felber, Ch...
JUCS
2010
150views more  JUCS 2010»
14 years 8 months ago
SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach
: Directories provide a general mechanism for describing resources and enabling information sharing within and across organizations. Directories must resolve differing structures a...
Lei Li, Vijay K. Vaishnavi, Art Vandenberg
JUCS
2010
64views more  JUCS 2010»
14 years 8 months ago
Selection among Renewable Energy Alternatives Using Fuzzy Axiomatic Design: The Case of Turkey
: Renewable energy is a source of energy derived from natural resources such as sunlight, wind, water, tides, hot dry rocks, magma, hot water springs, fire wood, animal manure, and...
Cengiz Kahraman, Selcuk Cebi, Ihsan Kaya
JUCS
2010
152views more  JUCS 2010»
14 years 8 months ago
Introducing Living Lab's Method as Knowledge Transfer from one Socio-Institutional Context to another: Evidence from Helsinki-Ta
: The present article aims to describe the Living Lab’s method as a method innovation in institutional activities and the problems of taking this innovation into use. Possibiliti...
Katri-Liis Lepik, Merle Krigul, Erik Terk
98
Voted
KBSE
2010
IEEE
14 years 8 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes