Sciweavers

2550 search results - page 411 / 510
» Enterprise Content Management
Sort
View
146
Voted
ISCA
2008
IEEE
165views Hardware» more  ISCA 2008»
15 years 11 months ago
Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory
We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be m...
Lee Baugh, Naveen Neelakantam, Craig B. Zilles
ITNG
2008
IEEE
15 years 11 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
PIMRC
2008
IEEE
15 years 11 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
147
Voted
WISE
2008
Springer
15 years 11 months ago
Bill Organiser Portal: A Case Study on End-User Composition
Abstract. Whilst Web services can be composed by technical developers using a language such as BPEL, there is no easy way for non-technical end users to take advantage of these ser...
Agnes Ro, Lily Shu-Yi Xia, Hye-Young Paik, Chea Hy...
COLCOM
2007
IEEE
15 years 11 months ago
Modeling trust in collaborative information systems
—Collaborative systems available on the Web allow millions of users to share information through a growing collection of tools and platforms such as wikis, blogs and shared forum...
Sara Javanmardi, Cristina Videira Lopes