Sciweavers

2814 search results - page 561 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
EDOC
2003
IEEE
15 years 9 months ago
Towards a Language for Coherent Enterprise Architecture Descriptions
A coherent description of architectures provides insight, enables communication among different stakeholders and guides complicated (business and ICT) change processes. Unfortunat...
Henk Jonkers, René van Buuren, Farhad Arbab...
134
Voted
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 9 months ago
Information Technology Fashions: Lifecycle Phase Analysis
Over the last decade, studies of management fashions have shown that the rise and fall of the fashions can be seen as a reflection of a knowledge enterprise, where knowledge of ne...
Jintae Lee, Emilio Collar Jr.
ISMAR
2003
IEEE
15 years 9 months ago
Resolving Multiple Occluded Layers in Augmented Reality
A useful function of augmented reality (AR) systems is their ability to visualize occluded infrastructure directly in a user’s view of the environment. This is especially import...
Mark A. Livingston, J. Edward Swan II, Joseph L. G...
132
Voted
SIGCOMM
2010
ACM
15 years 4 months ago
c-Through: part-time optics in data centers
Data-intensive applications that operate on large volumes of data have motivated a fresh look at the design of data center networks. The first wave of proposals focused on designi...
Guohui Wang, David G. Andersen, Michael Kaminsky, ...
155
Voted
JSS
2007
121views more  JSS 2007»
15 years 4 months ago
Opportunistic prioritised clustering framework for improving OODBMS performance
In object oriented database management systems, clustering has proven to be one of the most effective performance enhancement techniques. Existing clustering algorithms are mainly...
Zhen He, Richard Lai, Alonso Marquez, Stephen Blac...