Sciweavers

5723 search results - page 1116 / 1145
» Network Management
Sort
View
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
15 years 4 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
SIGUCCS
2005
ACM
15 years 4 months ago
Developing a synchronous web seminar application for online learning
Many higher education institutions are searching for cost effective tools for the delivery of a feature rich, synchronous online learning environment. While there are several comm...
Michael D. Ciocco, Neil Toporski, Michael Dorris
STORAGESS
2005
ACM
15 years 4 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
ATAL
2005
Springer
15 years 4 months ago
A comparative evaluation of agent location mechanisms in large scale MAS
Agents in open multi-agent systems (MAS) need means for locating other agents with which they may collaborate. To address this need, several agent location mechanisms were suggest...
David Ben-Ami, Onn Shehory
DRM
2005
Springer
15 years 4 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
« Prev « First page 1116 / 1145 Last » Next »