Sciweavers

1092 search results - page 125 / 219
» Located Operators
Sort
View
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 1 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
ICCS
2007
Springer
15 years 8 months ago
Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management
Abstract. We describe a prototype emergency and disaster information system designed and implemented using DDDAS concepts. The system is designed to use real-time cell phone callin...
Gregory R. Madey, Albert-László Bara...
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 7 months ago
Should I Stay or Should I Go? Worker Commitment to Virtual Organizations
As society enters the twenty-first century there is a growing realization that information technology (IT) is heavily influencing organizational structures [1]. One such structure...
Yulin Fang, Derrick J. Neufeld
GI
2008
Springer
15 years 2 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
KDD
2002
ACM
119views Data Mining» more  KDD 2002»
16 years 2 months ago
Evaluating classifiers' performance in a constrained environment
In this paper, we focus on methodology of finding a classifier with a minimal cost in presence of additional performance constraints. ROCCH analysis, where accuracy and cost are i...
Anna Olecka