Sciweavers

575 search results - page 103 / 115
» A model for evaluating IT security investments
Sort
View
122
Voted
AINA
2007
IEEE
15 years 8 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
ISPASS
2007
IEEE
15 years 8 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 8 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
129
Voted
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 7 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 7 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen