Sciweavers

706 search results - page 64 / 142
» Clone-Aware Configuration Management
Sort
View
139
Voted
HOTOS
2007
IEEE
15 years 9 months ago
Don't Settle for Less Than the Best: Use Optimization to Make Decisions
Many systems design, configuration, runtime and management decisions must be made from a large set of possible alternatives. Ad hoc heuristics have traditionally been used to make...
Kimberly Keeton, Terence Kelly, Arif Merchant, Cip...
149
Voted
CAISE
2006
Springer
15 years 7 months ago
Process Support in eHome Systems: Empowering Providers to Handle a Future Mass Market
Abstract. This paper focuses on the sales and distribution phase in eHome systems. The huge market potential for affordable solutions leads to a multiplicity in terms of millions o...
Ibrahim Armac, Michael Kirchhof
DBSEC
2010
152views Database» more  DBSEC 2010»
15 years 6 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
ECIS
2000
15 years 6 months ago
Leveraging Professional Intellect in the Virtual Age
The paper explores the nature of professional intellect and the requirements for managing it, an area acknowledged as being under-researched. Five case studies in the professional ...
Dieter Fink
SACMAT
2010
ACM
15 years 5 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin