Sciweavers

433 search results - page 19 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
BCS
2008
13 years 9 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
CLUSTER
2009
IEEE
14 years 2 months ago
Utility analysis for Internet-oriented server consolidation in VM-based data centers
—Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in tod...
Ying Song, Yanwei Zhang, Yuzhong Sun, Weisong Shi
ERCIMDL
2006
Springer
131views Education» more  ERCIMDL 2006»
13 years 11 months ago
Repository Replication Using NNTP and SMTP
We present the results of a feasibility study using shared, existing, network-accessible infrastructure for repository replication. We utilize the SMTP and NNTP protocols to replic...
Joan A. Smith, Martin Klein, Michael L. Nelson
GIS
2009
ACM
14 years 8 months ago
Efficient Viewpoint Assignment for Urban Texture Documentation
We envision participatory texture documentation (PTD) as a process in which a group of users (dedicated individuals and/or general public) with camera-equipped mobile phones parti...
Cyrus Shahabi, Farnoush Banaei Kashani, Houtan Shi...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
14 years 1 months ago
Autonomous Index Optimization in XML Databases
Abstract— Defining suitable indexes is a major task when optimizing a database. Usually, a human database administrator defines a set of indexes in the design phase of the data...
Beda Christoph Hammerschmidt, Martin Kempa, Volker...