Sciweavers

6894 search results - page 1299 / 1379
» On network interference management
Sort
View
118
Voted
JCDL
2003
ACM
87views Education» more  JCDL 2003»
15 years 9 months ago
The Web-DL Environment for Building Digital Libraries from the Web
The Web contains a huge volume of unstructured data, which is difficult to manage. In digital libraries, on the other hand, information is explicitly organized, described, and ma...
Pável Calado, Marcos André Gon&ccedi...
SIGECOM
2003
ACM
174views ECommerce» more  SIGECOM 2003»
15 years 9 months ago
Collaboration software to reduce inventory and increase response
Some recent trends in business and manufacturing hold the promise of greater profits, yet, due to profit-robbing inventory increases, this promise has not been fully realized. [9]...
Indu Bingham, Barbara Hoefle, Kim Phan, Jim Sizemo...
CLOUD
2010
ACM
15 years 9 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
PRDC
2002
IEEE
15 years 9 months ago
Caveat Emptor: Making Grid Services Dependable from the Client Side
Grid computing relies on fragile partnerships. Clients with hundreds or even thousands of pending service requests must seek out and form temporary alliances with remote servers e...
Miron Livny, Douglas Thain
SACMAT
2010
ACM
15 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
« Prev « First page 1299 / 1379 Last » Next »