Sciweavers

1049 search results - page 205 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
NSDI
2010
14 years 10 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
COMGEO
2010
ACM
14 years 6 months ago
A new paradigm for integrated environmental monitoring
The vision of an integrated Earth observation system to help protect and sustain the planet and its inhabitants is significant and timely, and thus has been identified recently by...
Kevin Montgomery, Carsten W. Mundt
CODASPY
2012
13 years 5 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
RTSS
2002
IEEE
15 years 2 months ago
STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications. In these applications, transactions and data it...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
SOFTVIS
2010
ACM
14 years 9 months ago
AllocRay: memory allocation visualization for unmanaged languages
A programs memory system performance is one of the key determinants of its overall performance. Lack of understanding of a programs memory system behavior can lead to performance ...
George G. Robertson, Trishul M. Chilimbi, Bongshin...