Sciweavers

2376 search results - page 385 / 476
» CM - Configuration Change Management
Sort
View
CLUSTER
2006
IEEE
13 years 9 months ago
Autonomous recovery in componentized Internet applications
In this paper we show how to reduce downtime of J2EE applications by rapidly and automatically recovering from transient and intermittent software failures, without requiring appl...
George Candea, Emre Kiciman, Shinichi Kawamoto, Ar...
EJIS
2006
132views more  EJIS 2006»
13 years 9 months ago
Enacting new temporal boundaries: the role of mobile phones
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...
Elpida Prasopoulou, Athanasia Pouloudi, Niki Pante...
EOR
2006
58views more  EOR 2006»
13 years 9 months ago
Bucket brigades revisited: Are they always effective?
Previous work on the dynamics of bucket brigades has focused on systems in which workers can be ordered with respect to their speeds and where this ordering does not change throug...
Dieter Armbruster, Esma Senturk Gel
IJIPT
2008
191views more  IJIPT 2008»
13 years 9 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
ISEM
2008
129views more  ISEM 2008»
13 years 9 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai