Sciweavers

1558 search results - page 206 / 312
» Scalable work stealing
Sort
View
ICOIN
2004
Springer
14 years 3 months ago
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs
Abstract. In our previous work, we have proposed a new VPN architecture for enabling user-based multiply associated VPNs [1]. Almost all existing VPN technologies assume that users...
Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yos...
INEX
2004
Springer
14 years 3 months ago
DocBase - The INEX Evaluation Experience
Abstract. Can a system designed primarily for the purpose of databasetype storage and retrieval be used for information-retrieval tasks? This was one of the questions that led us t...
Sriram Mohan, Arijit Sengupta
ISAS
2004
Springer
14 years 3 months ago
A Modular Approach for Model-Based Dependability Evaluation of a Class of Systems
Analytical and simulative modeling for dependability and performance evaluation has been proven to be a useful and versatile approach in all the phases of the system life cycle. I...
Stefano Porcarelli, Felicita Di Giandomenico, Paol...
ISI
2004
Springer
14 years 3 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle
ISMIR
2004
Springer
179views Music» more  ISMIR 2004»
14 years 3 months ago
Industrial audio fingerprinting distributed system with CORBA and Web Services
With digital technologies, music content providers face serious challenges to protect their rights. Due to the widespread nature of music sources, it is very difficult to central...
Jose Pedro, Vadim Tarasov, Eloi Batlle, Enric Guau...