Sciweavers

12635 search results - page 2389 / 2527
» Which semantic web
Sort
View
123
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
A Content Model for Evaluating Peer-to-Peer Searching Techniques
Simulation studies are frequently used to evaluate new peer-to-peer searching techniques as well as existing techniques on new applications. Unless these studies are accurate in th...
Brian F. Cooper
173
Voted
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 9 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
133
Voted
SIGUCCS
2003
ACM
15 years 9 months ago
Training program growth...: from flat line to pulsating
IT Training and Communications is a division of Information Technology Services (ITS), which provides computer application training for the faculty and staff at Saint Louis Univer...
Sue A. Moore
125
Voted
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 8 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
143
Voted
CLOUD
2010
ACM
15 years 8 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
« Prev « First page 2389 / 2527 Last » Next »