Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
WETICE
2006
IEEE
12 years 2 months ago
Architecture of a Network Monitoring Element
A Network Monitoring system is a vital component of a Grid; however, its scalability is a challenge. We propose a network monitoring approach that combines passive monitoring, a do...
Augusto Ciuffoletti, Michalis Polychronakis
WETICE
2006
IEEE
12 years 2 months ago
Replica Update Propagation for Grid Data Resources
Data replication is a well established concept in the grid community to increase data availability and faulttolerance in the grid environment. However, there is a lack of software...
Marek Ciglan, Ladislav Hluchý
WETICE
2006
IEEE
12 years 2 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
WETICE
2006
IEEE
12 years 2 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
WETICE
2006
IEEE
12 years 2 months ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
WETICE
2006
IEEE
12 years 2 months ago
A Generic Coordination Architecture as an Enabler for Mobile Collaborative Applications
Manfred Bortenschlager, Sigi Reich, Gabriele Kotsi...
WETICE
2006
IEEE
12 years 2 months ago
Multi-Dimensional Performance Framework for Enterprise Knowledge Infrastructures
— Within service-oriented business environments, the non-routine processing of requests requires a greater degree of social interaction and learning in order to achieve an effect...
Joe Bolinger, Jay Ramanathan
WETICE
2006
IEEE
12 years 2 months ago
Some Problems in Sanitizing Network Data
The problem of removing sensitive information from data before it is released publicly, or turned over to less trusted analysts, underlies much of the unwillingness to share data....
Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lis...
books