Sciweavers

15782 search results - page 3097 / 3157
» Network Optimization and Control
Sort
View
SIGUCCS
2003
ACM
14 years 2 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
EMSOFT
2003
Springer
14 years 2 months ago
Resource Interfaces
We present a formalism for specifying component interfaces that expose component requirements on limited resources. The formalism permits an algorithmic check if two or more compon...
Arindam Chakrabarti, Luca de Alfaro, Thomas A. Hen...
ICARIS
2003
Springer
14 years 2 months ago
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems
Supermarkets lose millions of pounds every year through lost trading and stock wastage caused by the failure of refrigerated cabinets. Therefore, a huge commercial market exists fo...
Dan W. Taylor, David Corne
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
14 years 2 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
CLOUD
2010
ACM
14 years 2 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
« Prev « First page 3097 / 3157 Last » Next »