Sciweavers

9503 search results - page 1829 / 1901
» Authenticated System Calls
Sort
View
145
Voted
ICNP
2000
IEEE
15 years 9 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
ISSRE
2000
IEEE
15 years 9 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
151
Voted
WISE
2000
Springer
15 years 9 months ago
XML Content Management Based on Object-Relational Database Technology
XML (Extensible Markup Language) is a textual markup language designed for the creation of self-describing documents. Such documents contain textual data combined with structural ...
Budi Surjanto, Norbert Ritter, Henrik Loeser
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
15 years 9 months ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
141
Voted
SIGUCCS
2000
ACM
15 years 9 months ago
Automating Residence Hall Internet Signups
As colleges and universities are moving into the realm of providing Internet connections to the residence dormitories (ResNet), the local help desk is becoming the focal point for...
John R. Miller, Tom Peterson
« Prev « First page 1829 / 1901 Last » Next »