Sciweavers

1554 search results - page 225 / 311
» An Overview of the Spring System
Sort
View
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 9 months ago
Extensible optimization in overlay dissemination trees
We introduce XPORT, a profile-driven distributed data dissemination system that supports an extensible set of data types, profile types, and optimization metrics. XPORT efficientl...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
SIGMOD
2003
ACM
146views Database» more  SIGMOD 2003»
14 years 9 months ago
The Piazza peer data management project
A major problem in today's information-driven world is that sharing heterogeneous, semantically rich data is incredibly difficult. Piazza is a peer data management system tha...
Igor Tatarinov, Zachary G. Ives, Jayant Madhavan, ...
CISIS
2009
IEEE
14 years 3 months ago
Designing Regular Network-on-Chip Topologies under Technology, Architecture and Software Constraints
—Regular multi-core processors are appearing in the embedded system market as high performance software programmable solutions. The use of regular interconnect fabrics for them a...
Francisco Gilabert Villamón, Daniele Ludovi...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 3 months ago
Service Composition in Public Networks: Results from a Quasi-Experiment
New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and ...
Ralph Feenstra, Marijn Janssen
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham