Sciweavers

6574 search results - page 1200 / 1315
» Current Signatures: Application
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
IPPS
2007
IEEE
14 years 2 months ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
IPPS
2007
IEEE
14 years 2 months ago
File Creation Strategies in a Distributed Metadata File System
As computing breaches petascale limits both in processor performance and storage capacity, the only way that current and future gains in performance can be achieved is by increasi...
Ananth Devulapalli, Pete Wyckoff
IRI
2007
IEEE
14 years 2 months ago
The Software Reuse Working Group: A Case Study in Fostering Reuse
Packaging software assets for reuse can improve the potential for others to adopt the software. Packaging the software with appropriate documentation and other resources can facil...
Ryan Gerard, Robert R. Downs, James J. Marshall, R...
ISCA
2007
IEEE
168views Hardware» more  ISCA 2007»
14 years 2 months ago
Limiting the power consumption of main memory
The peak power consumption of hardware components affects their power supply, packaging, and cooling requirements. When the peak power consumption is high, the hardware components...
Bruno Diniz, Dorgival Olavo Guedes Neto, Wagner Me...
« Prev « First page 1200 / 1315 Last » Next »