Sciweavers

10210 search results - page 86 / 2042
» Configuring Database Systems
Sort
View
CCR
2004
151views more  CCR 2004»
13 years 10 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
SENSYS
2003
ACM
14 years 3 months ago
Integrated coverage and connectivity configuration in wireless sensor networks
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Cheny...
SIGMOD
1994
ACM
133views Database» more  SIGMOD 1994»
14 years 2 months ago
Quickly Generating Billion-Record Synthetic Databases
: Evaluating database system performance often requires generating synthetic databases
Jim Gray, Prakash Sundaresan, Susanne Englert, Ken...
WETICE
2007
IEEE
14 years 4 months ago
Towards Configurable Process Visualizations with Proviado
Visualizing complex business processes is an important task of process-aware information systems (PAIS). Current PAIS, however, fail in providing adequate mechanisms for visualizi...
Ralph Bobrik, Thomas Bauer
ISPAN
1999
IEEE
14 years 2 months ago
A Java Internet Computing Environment with Effective Configuration Method
For an effective Internet-based distributed parallel computing platform, Java-Internet Computing Environment (JICE) is designed and implemented with multithreading and remote meth...
Chun-Mok Chung, Pil-Sup Shin, Shin-Dug Kim