Sciweavers

1530 search results - page 227 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
JTAER
2006
100views more  JTAER 2006»
14 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
ECOOPW
2006
Springer
15 years 1 months ago
Architecture-Centric Evolution: New Issues and Trends
Abstract. Software evolution has largely been focused on low-level implementation artefacts through refactoring techniques rather than the architectural level. However code-centric...
Paris Avgeriou, Uwe Zdun, Isabelle Borne
PLDI
2009
ACM
15 years 4 months ago
Stretching transactional memory
Transactional memory (TM) is an appealing abstraction for programming multi-core systems. Potential target applications for TM, such as business software and video games, are like...
Aleksandar Dragojevic, Rachid Guerraoui, Michal Ka...
ISEMANTICS
2010
14 years 11 months ago
SESAME demonstrator: ontologies, services and policies for energy efficiency
The project SESAME uses semantic modeling and reasoning to support home owners and building managers in saving energy and in optimizing their energy costs while maintaining their ...
Slobodanka Tomic, Anna Fensel, Tassilo Pellegrini
SIGUCCS
2005
ACM
15 years 3 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody