Sciweavers

319 search results - page 37 / 64
» Maintaining Consistency of Client-Cached Data
Sort
View
ISTA
2004
13 years 11 months ago
Applying Web Service Compositions in Systems Management
: Systems management in any organization depends exclusively on the efforts of a system administrator. Every change in the IT infrastructure landscape requires changes in the syste...
Dimka Karastoyanova
PVLDB
2008
146views more  PVLDB 2008»
13 years 9 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
IAJIT
2010
162views more  IAJIT 2010»
13 years 8 months ago
Deriving Conceptual Schema from Domain Ontology: A Web Application Reverse Engineering Approach
: The heterogeneous and dynamic nature of components making up a web application, the lack of effective programming mechanisms for implementing basic software engineering principle...
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul Bo...
NOMS
2010
IEEE
171views Communications» more  NOMS 2010»
13 years 8 months ago
Operator and radio resource sharing in multi-carrier environments
—Today’s mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and ...
Pongsakorn Teeraparpwong, Per Johansson, Harsha V....
P2P
2008
IEEE
137views Communications» more  P2P 2008»
14 years 4 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack