Sciweavers

948 search results - page 131 / 190
» Analysis of SITA policies
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 4 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
MM
2000
ACM
100views Multimedia» more  MM 2000»
15 years 4 months ago
Stochastic resource prediction and admission for interactive sessions on multimedia servers
In highly interactive multimedia applications startup latency is significant, and may negatively impact performance and Quality of Service (QoS). To avoid this, our approach is t...
Matthias Friedrich, Silvia Hollfelder, Karl Aberer
APWEB
2006
Springer
15 years 3 months ago
Implementing Privacy Negotiations in E-Commerce
This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. We analyze how negotiation te...
Sören Preibusch
JSSPP
2000
Springer
15 years 3 months ago
Time-Sharing Parallel Jobs in the Presence of Multiple Resource Requirements
Abstract. Buffered coscheduling is a new methodology that can substantially increase resource utilization, improve response time, and simplify the development of the run-time suppo...
Fabrizio Petrini, Wu-chun Feng
WSC
2008
15 years 2 months ago
Iterative use of simulation and scheduling methodologies to improve productivity
Experienced and wise industrial engineering educators and practitioners have long understood that industrial engineering is a coherent discipline encompassing techniques that work...
Karthik Krishna Vasudevan, Ravindra Lote, Edward J...