Sciweavers

1330 search results - page 235 / 266
» License-Aware Service Selection
Sort
View
ACSAC
2008
IEEE
15 years 5 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
COMSWARE
2008
IEEE
15 years 5 months ago
An efficient and bandwidth sensitive parallel download scheme in data grids
—For modern scientific applications such as astrophysics, astronomy, aerography, and biology, a large amount of storage space is required because of the large-scale datasets. Dat...
Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, ...
75
Voted
GLOBECOM
2008
IEEE
15 years 5 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 5 months ago
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise’s management executives. Such alignment is an organization-wide issue that...
Leonel Plazaola, Johnny Flores, Norman Vargas, Mat...
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
15 years 5 months ago
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...
Sinnakkrishnan Perumal, Ambuj Mahanti