Sciweavers

251 search results - page 35 / 51
» Transactions with isolation and cooperation
Sort
View
NOCS
2007
IEEE
14 years 4 months ago
The Power of Priority: NoC Based Distributed Cache Coherency
The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
IDTRUST
2009
ACM
14 years 4 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
CSCW
1998
ACM
14 years 2 months ago
Meme Tags and Community Mirrors: Moving from Conferences to Collaboration
Meme Tags are part of a body of research on GroupWear: a wearable technology that supports people in the formative stages of cooperative work. Conference participants wear Meme Ta...
Richard Borovoy, Fred Martin, Sunil Vemuri, Mitche...
CSCWD
2005
Springer
13 years 11 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
BIS
2007
105views Business» more  BIS 2007»
13 years 11 months ago
Improving the Accuracy of Job Search with Semantic Techniques
In this paper we introduce a prototype job portal which uses semantically annotated job offers and applicants. In our opinion, using Semantic Web technologies substantially increa...
Malgorzata Mochol, Holger Wache, Lyndon J. B. Nixo...