Sciweavers

2376 search results - page 411 / 476
» CM - Configuration Change Management
Sort
View
IV
2007
IEEE
144views Visualization» more  IV 2007»
14 years 3 months ago
Visualizing Evolving Searches with EvoBerry
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...
Edward Suvanaphen, Jonathan C. Roberts
CCS
2007
ACM
14 years 3 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CPAIOR
2007
Springer
14 years 3 months ago
Cost-Bounded Binary Decision Diagrams for 0-1 Programming
Abstract. In recent work binary decision diagrams (BDDs) were introduced as a technique for postoptimality analysis for integer programming. In this paper we show that much smaller...
Tarik Hadzic, John N. Hooker
DEXAW
2006
IEEE
140views Database» more  DEXAW 2006»
14 years 3 months ago
String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures
: Scalable Distributed Data Structures (SDDSs) store large scalable files over a distributed RAM of nodes in a grid or a P2P network. The files scale transparently for the applicat...
Riad Mokadem, Witold Litwin
CONEXT
2006
ACM
14 years 3 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai