Sciweavers

83 search results - page 15 / 17
» Automated Availability Management Driven by Business Policie...
Sort
View
97
Voted
SRDS
2010
IEEE
14 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
75
Voted
IEPOL
2010
130views more  IEPOL 2010»
14 years 7 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
HICSS
1999
IEEE
123views Biometrics» more  HICSS 1999»
15 years 2 months ago
Analysis of Power Pools in the Deregulated Energy Market through Simulation
The electricity market has changed rapidly in the Northern European countries. Harmonisation of the legislation and trading methods widens the market area outside national limits....
Simo Makkonen, Risto Lahdelma
94
Voted
SAC
2006
ACM
14 years 10 months ago
Generating correct EPCs from configured C-EPCs
Process reference models play an important role for the alignment and configuration of commercial off-the-shelf Enterprise Systems to requirements of an organization. Recently, Co...
Jan Mendling, Jan Recker, Michael Rosemann, Wil M....
OOPSLA
2009
Springer
15 years 4 months ago
A market-based approach to software evolution
Software correctness has bedeviled the field of computer science since its inception. Software complexity has increased far more quickly than our ability to control it, reaching ...
David F. Bacon, Yiling Chen, David C. Parkes, Malv...