Sciweavers

2421 search results - page 275 / 485
» Consistency Management for Complex Applications
Sort
View
INTERACT
2007
15 years 6 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
PDSE
2000
86views more  PDSE 2000»
15 years 6 months ago
A Principled Approach to Supporting Adaptation in Distributed Mobile Environments
To support multimedia applications in mobile environments, it will be necessary for applications to be aware of the underlying environmental conditions, and also to be able to ada...
Gordon S. Blair, Geoff Coulson, Anders Andersen, L...
CCS
2010
ACM
15 years 5 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
JCIT
2008
165views more  JCIT 2008»
15 years 5 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
141
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...