Sciweavers

4345 search results - page 764 / 869
» Temporal Constraint Networks
Sort
View
DSOM
2003
Springer
14 years 1 months ago
Policy-Based Autonomic Storage Allocation
The goal of autonomic storage allocation is to achieve allocation of storage resources, their performance monitoring, and hotspot elimination by specifying comparatively high-leve...
Murthy V. Devarakonda, David M. Chess, Ian Whalley...
ESTIMEDIA
2003
Springer
14 years 1 months ago
Reducing Backlight Power Consumption for Streaming Video Applications on Mobile Handheld Devices
Mobile handheld devices have stringent constraints on power consumption because they run on batteries that have a limited lifetime. Conserving power to prolong battery life is of ...
Sudeep Pasricha, Shivajit Mohapatra, Manev Luthra,...
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
14 years 18 days ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
MMMACNS
2001
Springer
14 years 6 days ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
RAID
2001
Springer
14 years 6 days ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...