Sciweavers

1615 search results - page 84 / 323
» Dark application communities
Sort
View
VLDB
1999
ACM
142views Database» more  VLDB 1999»
15 years 8 months ago
Active Storage Hierarchy, Database Systems and Applications - Socratic Exegesis
stract This panel addresses a very important area that is often neglected or overlooked by database systems, database applications developers and data warehouse designers, namely s...
Felipe Cariño, William O'Connell, John Burg...
LISA
2007
15 years 6 months ago
Application Buffer-Cache Management for Performance: Running the World's Largest MRTG
An operating system’s readahead and buffer-cache behaviors can significantly impact application performance; most often these better performance, but occasionally they worsen it...
David Plonka, Archit Gupta, Dale Carder
BMCBI
2008
112views more  BMCBI 2008»
15 years 4 months ago
A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regul
Background: Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Al...
Arnab Bhattacharya, Sasha Levy, Adria LeBoeuf, Mic...
MASS
2010
156views Communications» more  MASS 2010»
15 years 2 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
DIM
2007
ACM
15 years 8 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...