Sciweavers

389 search results - page 70 / 78
» Metamodeling Autonomic System Management Policies - Ongoing ...
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
MIDDLEWARE
2007
Springer
15 years 3 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
68
Voted
MTSR
2007
Springer
15 years 3 months ago
The Human Art of Encoding: Markup as Documentary Practice
This paper describes the Markup Analysis Project, a research initiative of the Information Policy and Practice Research Group at the University of Sydney to investigate frameworks ...
Paul Scifleet, Susan P. Williams, Creagh Cole
ACSC
2003
IEEE
15 years 2 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
SIGUCCS
2005
ACM
15 years 3 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody