Sciweavers

762 search results - page 143 / 153
» Modeling and Simulating Information Security Management
Sort
View
EENERGY
2010
15 years 1 months ago
Towards energy-aware scheduling in data centers using machine learning
As energy-related costs have become a major economical factor for IT infrastructures and data-centers, companies and the research community are being challenged to find better an...
Josep Lluis Berral, Iñigo Goiri, Ramon Nou,...
ISCAPDCS
2004
14 years 11 months ago
Location Based Access to Moving Data Sources
Location based services in mobile environments have been recognized as a challenging problem that calls for new service models and dynamic strategies. The problem becomes even har...
Shiow-yang Wu, Wei-chung Ko
PODC
2003
ACM
15 years 2 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
IBMRD
2011
112views more  IBMRD 2011»
14 years 4 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
MANSCI
2007
90views more  MANSCI 2007»
14 years 9 months ago
Selecting a Selection Procedure
Selection procedures are used in a variety of applications to select the best of a finite set of alternatives. ‘Best’ is defined with respect to the largest mean, but the me...
Jürgen Branke, Stephen E. Chick, Christian Sc...