Sciweavers

1969 search results - page 159 / 394
» Challenges in Enterprise Search
Sort
View
JPDC
2006
111views more  JPDC 2006»
13 years 9 months ago
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Irregular parallel algorithms pose a significant challenge for achieving high performance because of the difficulty predicting memory access patterns or execution paths. Within an...
Guojing Cong, David A. Bader
IJCIM
2002
141views more  IJCIM 2002»
13 years 9 months ago
STEP-based data schema for implementing product data management system
Currently, the challenge of implementing a product data management system (PDMS) is how to ensure system integration and product data exchange is shared between heterogeneous syste...
Shen-Chou Yeh, Chun-Fong You
PUC
2010
139views more  PUC 2010»
13 years 8 months ago
Digital plumbing: the mundane work of deploying UbiComp in the home
Deploying UbiComp in real homes is central to realizing Weiserʼs grand vision of ʻinvisibleʼ computing. It is essential to moving design out of the lab and making it into an unr...
Peter Tolmie, Andy Crabtree, Stefan Rennick Eggles...
AISS
2010
165views more  AISS 2010»
13 years 7 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha