Sciweavers

830 search results - page 27 / 166
» The Changing World of Outsourcing
Sort
View
IPM
2006
184views more  IPM 2006»
13 years 8 months ago
How are we searching the World Wide Web? A comparison of nine search engine transaction logs
The Web and especially major Web search engines are essential tools in the quest to locate online information for many people. This paper reports results from research that examin...
Bernard J. Jansen, Amanda Spink
JCC
2007
80views more  JCC 2007»
13 years 8 months ago
In between worlds: G.N. Lewis, the shared pair bond and its multifarious contexts
: In this paper, I will look at the rather convoluted discovery process which gave birth to the concept of the shared electron pair bond as developed by G.N. Lewis, to be subsequen...
Ana Simões
SIGCOMM
2012
ACM
11 years 11 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
PDP
2010
IEEE
14 years 3 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 8 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias