Sciweavers

8087 search results - page 1441 / 1618
» Meta Data Management
Sort
View
IM
2007
15 years 5 months ago
Capacity and Performance Overhead in Dynamic Resource Allocation to Virtual Containers
—Today’s enterprise data centers are shifting towards a utility computing model where many business critical applications share a common pool of infrastructure resources that o...
Zhikui Wang, Xiaoyun Zhu, Pradeep Padala, Sharad S...
IM
2007
15 years 5 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
INTERACT
2007
15 years 5 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
OWLED
2008
15 years 5 months ago
Opening, Closing Worlds - On Integrity Constraints
In many data-centric applications it is desirable to use OWL as an expressive schema language where one expresses constraints that need to be satisfied by the (instance) data. Howe...
Evren Sirin, Michael Smith, Evan Wallace
SIMUTOOLS
2008
15 years 5 months ago
Bridging UMTS and multicast routing in ns-2
In this paper, we present the design and the implementation of a novel scheme for the multicast transmission of data over Universal Mobile Telecommunications System (UMTS) network...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
« Prev « First page 1441 / 1618 Last » Next »