Sciweavers

3886 search results - page 45 / 778
» Toward Recovery-Oriented Computing
Sort
View
TDSC
2008
125views more  TDSC 2008»
13 years 7 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
DNIS
2010
Springer
269views Database» more  DNIS 2010»
13 years 11 months ago
Data Management Challenges in Cloud Computing Infrastructures
Abstract. The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data m...
Divyakant Agrawal, Amr El Abbadi, Shyam Antony, Su...
FLAIRS
2004
13 years 9 months ago
Natural Language Generation and Discourse Context: Computing Distractor Sets from the Focus Stack
In human-human conversation, people use linguistic expressions that are flexibly tailored to context as a matter of course, and they expect their conversational partners to do lik...
David DeVault, Charles Rich, Candace L. Sidner
IJCAI
1989
13 years 8 months ago
A Computational Framework for Granularity and its Application to Educational Diagnosis
Many artificial intelligence systems implicitly use notions of granularity in reasoning, but there is very little research into granularity itself. An exception is the work of Hob...
Jim E. Greer, Gordon I. McCalla
CJ
2004
99views more  CJ 2004»
13 years 7 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura