Sciweavers

197 search results - page 17 / 40
» Capturing the essentials of federated systems
Sort
View
ICSM
2005
IEEE
14 years 3 months ago
A Category-theoretic Approach to Syntactic Software Merging
Software merging is a common and essential activity during the lifespan of large-scale software systems. Traditional textual merge techniques are inadequate for detecting syntacti...
Nan Niu, Steve M. Easterbrook, Mehrdad Sabetzadeh
JCDL
2005
ACM
145views Education» more  JCDL 2005»
14 years 3 months ago
The challenges in developing digital collections of phonograph records
To facilitate long-term preservation and sustain the utility of phonograph records, an efficient and economical workflow management system for digitization is necessary. We descri...
Catherine Lai, Ichiro Fujinaga, Cynthia A. Leive
SIGMETRICS
2005
ACM
119views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Characterizing the two-tier gnutella topology
Characterizing the properties of peer-to-peer (P2P) overlay topologies in file-sharing applications is essential for understanding their impact on the network, identifying their ...
Daniel Stutzbach, Reza Rejaie
IJCAT
2008
72views more  IJCAT 2008»
13 years 9 months ago
Capacity analysis of container terminals using simulation techniques
Modeling and simulation are essential tools for the design and analysis of container terminals. A computer model can emulate the activities at various levels of details and captur...
Shell-Ying Huang, Wen-Jing Hsu, Chuanyu Chen, Rong...
GRID
2005
Springer
14 years 3 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...