Sciweavers

5344 search results - page 69 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICCS
2003
Springer
14 years 3 months ago
JDOS: A Jini Based Distributed Operating System
J-DOS provides and integrated JAVA environment for the execution of a program across an interconnected network of heterogeneous computers. The system provides a file system, shar...
M. Saywell, J. S. Reeve
DATE
2002
IEEE
146views Hardware» more  DATE 2002»
14 years 3 months ago
Automatic Generation of Fast Timed Simulation Models for Operating Systems in SoC Design
To enable fast and accurate evaluation of HW/SW implementation choices of on-chip communication, we present a method to automatically generate timed OS simulation models. The meth...
Sungjoo Yoo, Gabriela Nicolescu, Lovic Gauthier, A...
WSC
2000
13 years 11 months ago
Look-ahead strategies for controlling batch operations in industry: overview, comparison and exploration
Batching jobs in a manufacturing system is a very common policy in most industries. The main reasons for batching are avoidance of set ups and/or facilitation of material handling...
Durk-Jouke van der Zee
ACTA
2002
111views more  ACTA 2002»
13 years 10 months ago
Adding a path connectedness operator to FO+poly (linear)
In the constraint database community, FO+poly and FO+linear have been proposed as foundations for spatial database query languages. One of the strengths of this approach is that t...
Chris Giannella, Dirk Van Gucht
ICDCS
2012
IEEE
12 years 12 days ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...