Sciweavers

2624 search results - page 483 / 525
» Managing change (workshop)
Sort
View
SACMAT
2009
ACM
15 years 5 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
SOUPS
2009
ACM
15 years 5 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
SYSTOR
2009
ACM
15 years 5 months ago
The effectiveness of deduplication on virtual machine disk images
Virtualization is becoming widely deployed in servers to efficiently provide many logically separate execution environments while reducing the need for physical servers. While th...
Keren Jin, Ethan L. Miller
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 5 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 5 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...