Sciweavers

519 search results - page 29 / 104
» Enterprise computing asset management: a case study
Sort
View
RE
2010
Springer
14 years 5 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
79
Voted
ELPUB
2007
ACM
15 years 3 months ago
Towards a Semantic Turn in Rich-Media Analysis
Typical application scenarios in the area of rich-media management, such as the continuous digitisation of the media production processes, the search and retrieval tasks in a grow...
Tobias Bürger, Georg Güntner
TC
2008
14 years 11 months ago
Adaptive Fault Management of Parallel Applications for High-Performance Computing
As the scale of high-performance computing (HPC) continues to grow, failure resilience of parallel applications becomes crucial. In this paper, we present FT-Pro, an adaptive fault...
Zhiling Lan, Yawei Li
84
Voted
IPPS
1998
IEEE
15 years 3 months ago
Managing Concurrent Access for Shared Memory Active Messages
Passing messages through shared memory plays an important role on symmetric multiprocessors and on Clumps. The management of concurrent access to message queues is an important as...
Steven Lumetta, David E. Culler
ETS
2002
IEEE
99views Hardware» more  ETS 2002»
14 years 11 months ago
Online Learning Technology in an SME Work-Based Setting
Over the last 20 years there has been increasing interest in work-based learning in the UK business sector as a means to improve and increase the skills of the UK workforce. The m...
Bernd Brink, John Munro, Mike Osborne