Sciweavers

20024 search results - page 3744 / 4005
» Database Management Systems
Sort
View
EUROSEC
2008
ACM
15 years 5 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
135
Voted
FOIKS
2008
Springer
15 years 5 months ago
Towards a Fuzzy Logic for Automated Multi-issue Negotiation
Abstract. We present a novel logic-based approach to automate multi-issue bilateral negotiation in e-marketplaces. In such frameworks issues to negotiate on can be multiple, interr...
Azzurra Ragone, Umberto Straccia, Tommaso Di Noia,...
119
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
BUST: enabling scalable service orchestration
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...
Dong Liu, Ralph Deters
148
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
Load-balancing and caching for collection selection architectures
— To address the rapid growth of the Internet, modern Web search engines have to adopt distributed organizations, where the collection of indexed documents is partitioned among s...
Diego Puppin, Fabrizio Silvestri, Raffaele Perego,...
126
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
« Prev « First page 3744 / 4005 Last » Next »