Sciweavers

1352 search results - page 194 / 271
» Designing Security Requirements Models Through Planning
Sort
View
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 2 months ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
VLDB
2004
ACM
104views Database» more  VLDB 2004»
14 years 9 months ago
Retrieval effectiveness of an ontology-based model for information selection
Technology in the field of digital media generates huge amounts of nontextual information, audio, video, and images, along with more familiar textual information. The potential for...
Latifur Khan, Dennis McLeod, Eduard H. Hovy
ECSCW
2007
13 years 10 months ago
Semi-Synchronous Conflict Detection and Resolution in Asynchronous Software Development
Previous work has found that (a) when software is developed collaboratively, concurrent accesses to related pieces of code are made, and (b) when these accesses are coordinated asy...
Prasun Dewan, Rajesh Hegde
ICTAI
2010
IEEE
13 years 6 months ago
Continuous Search in Constraint Programming
This work presents the concept of Continuous Search (CS), which objective is to allow any user to eventually get their constraint solver achieving a top performance on their proble...
Alejandro Arbelaez, Youssef Hamadi, Michèle...
JPDC
2000
81views more  JPDC 2000»
13 years 8 months ago
A Dynamic Light-Weight Group Service
The virtual synchrony model for group communication has proven to be a powerful paradigm for building distributed applications. Implementations of virtual synchrony usually requir...
Luís Rodrigues, Katherine Guo, Paulo Ver&ia...