Sciweavers

1368 search results - page 258 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
EUROSYS
2010
ACM
14 years 4 months ago
Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or...
Ripal Nathuji, Aman Kansal, Alireza Ghaffarkhah
CCS
2007
ACM
14 years 1 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
WWW
2004
ACM
14 years 8 months ago
The interoperability of learning object repositories and services: standards, implementations and lessons learned
Interoperability is one of the main issues in creating a networked system of repositories. The eduSource project in its holistic approach to building a network of learning object ...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
CLEF
2006
Springer
13 years 11 months ago
MorphoSaurus in ImageCLEF 2006: The Effect of Subwords On Biomedical IR
We here describe the subword approach we used in the 2006 ImageCLEF Medical Image Retrieval task. It is based on the assupmtion that neither fully inflected nor automatically stem...
Philipp Daumke, Jan Paetzold, Kornél G. Mar...
WWW
2010
ACM
14 years 2 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile