Sciweavers

1815 search results - page 308 / 363
» Cloud Computing: An Overview
Sort
View
WEBI
2009
Springer
15 years 11 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
RWEB
2009
Springer
15 years 11 months ago
Description Logics
In this chapter we will introduce description logics, a family of logic-based knowledge representation languages that can be used to represent the terminological knowledge of an a...
Franz Baader
WIKIS
2009
ACM
15 years 11 months ago
3DWiki: the 3D Wiki engine
We demonstrate one of the potential paths of the evolution of wiki engines towards Web 3.0. We introduce 3dWiki - the 3D wiki engine, which was built according to 2-Layer Interfac...
Jacek Jankowski, Marek Jozwowicz, Yolanda Cobos, B...
CISIS
2008
IEEE
15 years 10 months ago
Latency Impact on Spin-Lock Algorithms for Modern Shared Memory Multiprocessors
In 2006, John Mellor-Crummey and Michael Scott received the Dijkstra Prize in Distributed Computing. This prize was for their 1991 paper on algorithms for scalable synchronization ...
Jan Christian Meyer, Anne C. Elster
ICDS
2008
IEEE
15 years 10 months ago
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...
Thomas Dreibholz, Erwin P. Rathgeb