Sciweavers

880 search results - page 133 / 176
» Mobile data and transaction management
Sort
View

Presentation
445views
16 years 10 months ago
Telecommunications Networks
The class lectures for this class are broadcast live on the internet. Video recordings of all classes are available on-line. The presrntation cover the following topics: A Review...
Raj Jain
IANDC
2008
140views more  IANDC 2008»
14 years 12 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
RAID
1999
Springer
15 years 4 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
15 years 5 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
ICDCS
2006
IEEE
15 years 5 months ago
Adaptive Control of Extreme-scale Stream Processing Systems
Abstract— Distributed stream processing systems offer a highly scalable and dynamically configurable platform for time-critical applications ranging from real-time, exploratory ...
Lisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Si...