Sciweavers

69 search results - page 11 / 14
» The Future of Enterprise Groupware Applications
Sort
View
ICSM
2008
IEEE
14 years 3 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...
ICDCS
2003
IEEE
14 years 1 months ago
Decision-Support Workload Characteristics on a Clustered Database Server from the OS Perspective
A range of database services are being offered on clusters of workstations today to meet the demanding needs of applications with voluminous datasets, high computational and I/O r...
Yanyong Zhang, Jianyong Zhang, Anand Sivasubramani...
PODS
2004
ACM
189views Database» more  PODS 2004»
14 years 8 months ago
The Lixto Data Extraction Project - Back and Forth between Theory and Practice
We present the Lixto project, which is both a research project in database theory and a commercial enterprise that develops Web data extraction (wrapping) and Web service definiti...
Georg Gottlob, Christoph Koch, Robert Baumgartner,...
GECON
2007
Springer
113views Business» more  GECON 2007»
14 years 2 months ago
Taxonomy of Grid Business Models
Grid Computing, initially intended to provide access to computational resources for high-performance computing applications, broadened its focus by addressing computational needs o...
Jörn Altmann, Mihaela Ion, Ashraf Adel Bany M...
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...