Sciweavers

2334 search results - page 368 / 467
» How are Real Grids Used
Sort
View
129
Voted
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
15 years 9 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
124
Voted
AUSAI
2005
Springer
15 years 9 months ago
Adaptive Utility-Based Scheduling in Resource-Constrained Systems
This paper addresses the problem of scheduling jobs in soft real-time systems, where the utility of completing each job decreases over time. We present a utility-based framework fo...
David Vengerov
116
Voted
AFRIGRAPH
2004
ACM
15 years 9 months ago
High fidelity reconstruction of the ancient Egyptian temple of Kalabsha
The ancient Egyptian temple of Kalabsha dates back to 30 BC. In 1963 the temple was dismantled and moved to a new site in order to save it from the rising waters of the Lake Nasse...
Veronica Sundstedt, Alan Chalmers, Philippe Martin...
102
Voted
NOSSDAV
2004
Springer
15 years 9 months ago
Considering altruism in peer-to-peer internet streaming broadcast
In peer-to-peer overlay for video broadcast, peers contribute a portion of the bandwidth to the overlay in return for the service. In the presence of network heterogeneity, it is ...
Yang-Hua Chu, Hui Zhang
CCS
2003
ACM
15 years 9 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang