Sciweavers

7762 search results - page 205 / 1553
» Availability in BitTorrent Systems
Sort
View
136
Voted
RE
2010
Springer
14 years 10 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
223
Voted
ICDE
2008
IEEE
119views Database» more  ICDE 2008»
16 years 4 months ago
MobiQual: QoS-aware Load Shedding in Mobile CQ Systems
Freshness and accuracy are two key measures of quality of service (QoS) in location-based, mobile continual queries (CQs). However, it is often difficult to provide both fresh and ...
Bugra Gedik, Kun-Lung Wu, Philip S. Yu, Ling Liu
146
Voted
ASPLOS
2004
ACM
15 years 9 months ago
Heat-and-run: leveraging SMT and CMP to manage power density through the operating system
Power density in high-performance processors continues to increase with technology generations as scaling of current, clock speed, and device density outpaces the downscaling of s...
Mohamed A. Gomaa, Michael D. Powell, T. N. Vijayku...
113
Voted
CCGRID
2003
IEEE
15 years 8 months ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis
148
Voted
WEBI
2001
Springer
15 years 8 months ago
Knowledge-Based Validation, Aggregation, and Visualization of Meta-data: Analyzing a Web-Based Information System
As meta-data become of ever more importance to the Web, we will need to start managing such meta-data. We argue that there is a strong need for meta-data validation and aggregation...
Heiner Stuckenschmidt, Frank van Harmelen