Sciweavers

18094 search results - page 3586 / 3619
» The Architecture of Secure Systems
Sort
View
ECOOPW
2003
Springer
14 years 3 months ago
Object Orientation and Web Services
The annual European workshop on Object Orientation and Web Services focusses challenges and potentials of service-oriented computing in relation to object-oriented technologies and...
Anthony Finkelstein, Winfried Lamersdorf, Frank Le...
EDBT
2010
ACM
151views Database» more  EDBT 2010»
14 years 3 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
14 years 3 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
ISCA
2010
IEEE
204views Hardware» more  ISCA 2010»
14 years 3 months ago
Energy proportional datacenter networks
Numerous studies have shown that datacenter computers rarely operate at full utilization, leading to a number of proposals for creating servers that are energy proportional with r...
Dennis Abts, Michael R. Marty, Philip M. Wells, Pe...
ACSC
2002
IEEE
14 years 2 months ago
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation
Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current...
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham
« Prev « First page 3586 / 3619 Last » Next »