Sciweavers

1092 search results - page 90 / 219
» Understanding Context Before Using It
Sort
View
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 7 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
GLOBECOM
2009
IEEE
14 years 2 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
CLUSTER
2004
IEEE
13 years 11 months ago
A client-centric grid knowledgebase
Grid computing brings with it additional complexities and unexpected failures. Just keeping track of our jobs traversing different grid resources before completion can at times be...
George Kola, Tevfik Kosar, Miron Livny
WCRE
2010
IEEE
13 years 6 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
ECBS
2006
IEEE
122views Hardware» more  ECBS 2006»
14 years 1 months ago
Customer-oriented Development of Complex Distributed Systems
Complex and distributed systems are more and more common. Hardware is going from strength to strength and is embedded in high performance peer-to-peer networks mostly. The task of...
Ivonne Erfurth