Sciweavers

52 search results - page 5 / 11
» On analyzing and specifying concerns for data as a service
Sort
View
GRID
2006
Springer
13 years 7 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
DILS
2004
Springer
14 years 11 days ago
PROVA: Rule-Based Java-Scripting for a Bioinformatics Semantic Web
Abstract. Transparent information integration across distributed and heterogeneous data sources and computational tools is a prime concern for bioinformatics. Recently, there have ...
Alexander Kozlenkov, Michael Schroeder
SIGMETRICS
2010
ACM
113views Hardware» more  SIGMETRICS 2010»
13 years 1 months ago
Reliability analysis of deduplicated and erasure-coded storage
Space efficiency and data reliability are two primary concerns for modern storage systems. Chunk-based deduplication, which breaks up data objects into single-instance chunks that...
Xiaozhou Li, Mark Lillibridge, Mustafa Uysal
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 1 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
SETP
2007
13 years 8 months ago
Using Communication Objects During Requirements Analysis
Requirement analysis continues to be one of the most critical and challenging phases during the software development process. Many object-oriented methodologies identify three pri...
Peter J. Clarke, Yingbo Wang, Tuan L. Cameron, Yal...