Sciweavers

2747 search results - page 451 / 550
» Network externalities in software systems
Sort
View
WWW
2003
ACM
14 years 9 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
WOSP
2004
ACM
14 years 2 months ago
Using locality of reference to improve performance of peer-to-peer applications
Peer-to-peer, or simply P2P, systems have recently emerged as a popular paradigm for building distributed applications. One key aspect of the P2P system design is the mechanism us...
Marcelo Werneck Barbosa, Melissa Morgado Costa, Ju...
RE
1997
Springer
14 years 1 months ago
Requirements Models in Context
The field of requirements engineering emerges out of tradition of research and engineering practice that stresses rtance of generalizations and abstractions. abstraction is essent...
Colin Potts
SIGOPS
2008
119views more  SIGOPS 2008»
13 years 8 months ago
Project Kittyhawk: building a global-scale computer: Blue Gene/P as a generic computing platform
This paper describes Project Kittyhawk, an undertaking at IBM Research to explore the construction of a nextgeneration platform capable of hosting many simultaneous web-scale work...
Jonathan Appavoo, Volkmar Uhlig, Amos Waterland
EUROSYS
2011
ACM
13 years 10 days ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...