Sciweavers

4004 search results - page 654 / 801
» Selecting an Approach to Designing Group Support Systems
Sort
View
FAST
2008
15 years 6 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
WWW
2010
ACM
15 years 11 months ago
Shout out: integrating news and reader comments
A useful approach for enabling computers to automatically create new content is utilizing the text, media, and information already present on the World Wide Web. The newly created...
Lisa M. Gandy, Nathan D. Nichols, Kristian J. Hamm...
EDBT
2008
ACM
120views Database» more  EDBT 2008»
16 years 4 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
TOG
2008
114views more  TOG 2008»
15 years 4 months ago
Automatic generation of tourist maps
Tourist maps are essential resources for visitors to an unfamiliar city because they visually highlight landmarks and other points of interest. Yet, hand-designed maps are static ...
Floraine Grabler, Maneesh Agrawala, Robert W. Sumn...
WWW
2008
ACM
16 years 5 months ago
Non-intrusive monitoring and service adaptation for WS-BPEL
Web service processes currently lack monitoring and dynamic (runtime) adaptation mechanisms. In highly dynamic processes, services frequently need to be exchanged due to a variety...
Oliver Moser, Florian Rosenberg, Schahram Dustdar