Sciweavers

703 search results - page 30 / 141
» The data management problem in post-pc devices and a solutio...
Sort
View
ACSAC
2000
IEEE
14 years 1 days ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
FAST
2008
13 years 10 months ago
Write Off-Loading: Practical Power Management for Enterprise Storage
In enterprise data centers power usage is a problem impacting server density and the total cost of ownership. Storage uses a significant fraction of the power budget and there are...
Dushyanth Narayanan, Austin Donnelly, Antony I. T....
BPSC
2009
240views Business» more  BPSC 2009»
13 years 8 months ago
Modelling and Solving Configuration Problems on Business Processes Using a Multi-Level Constraint Satisfaction Approach
Abstract: In this paper we present our ideas to apply constraint satisfaction on business processes. We propose a multi-level constraint satisfaction approach to handle t levels of...
Wolfgang Runte
CIKM
1994
Springer
13 years 11 months ago
Facilitating Transformations in a Human Genome Project Database
Human Genome Project databases present a confluence of interesting database challenges: rapid schema and data evolution, complex data entry and constraint management, and the need...
Susan B. Davidson, Anthony Kosky, Barbara A. Eckma...
IADIS
2004
13 years 9 months ago
A Middleware Service for Managing Time and Quality Dependent Context
Nowadays, wearable devices, such as mobile phones, PDAs, etc. gain widespread popularity for communication and data exchange. Consequently, several approaches investigate the prob...
Tasos Kontogiorgis, Dimitrios I. Fotiadis, Apostol...