Sciweavers

810 search results - page 155 / 162
» Reconfiguration of Resources in Middleware
Sort
View
AEI
2010
148views more  AEI 2010»
13 years 7 months ago
Modeling and monitoring of construction supply chains
The planning and management of supply chains require properly specifying the participating members and the relationships among them. Construction supply chains usually consist of n...
Jack C. P. Cheng, Kincho H. Law, Hans Bjornsson, A...
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
CACM
2005
126views more  CACM 2005»
13 years 7 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
ISCA
2010
IEEE
216views Hardware» more  ISCA 2010»
13 years 6 months ago
The impact of management operations on the virtualized datacenter
Virtualization has the potential to dramatically reduce the total cost of ownership of datacenters and increase the flexibility of deployments for general-purpose workloads. If pr...
Vijayaraghavan Soundararajan, Jennifer M. Anderson
TON
2010
161views more  TON 2010»
13 years 2 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...