Sciweavers

1272 search results - page 198 / 255
» Supporting distributed software development by modes of coll...
Sort
View
139
Voted
ICWS
2008
IEEE
15 years 5 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart
137
Voted
TWC
2008
156views more  TWC 2008»
15 years 3 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
122
Voted
CHI
2011
ACM
14 years 7 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman
ISPAN
2008
IEEE
15 years 10 months ago
A Taxonomy of Data Prefetching Mechanisms
Data prefetching has been considered an effective way to mask data access latency caused by cache misses and to bridge the performance gap between processor and memory. With hardw...
Surendra Byna, Yong Chen, Xian-He Sun
104
Voted
ADBIS
2007
Springer
74views Database» more  ADBIS 2007»
15 years 9 months ago
Preventing Orphan Requests by Integrating Replication and Transactions
Replication is crucial to achieve high availability distributed systems. However, non-determinism introduces consistency problems between replicas. Transactions are very well suite...
Heine Kolltveit, Svein-Olaf Hvasshovd