Sciweavers

3006 search results - page 224 / 602
» Overview
Sort
View
AGILEDC
2007
IEEE
15 years 10 months ago
Greater successes by using Agile Techniques closer to the light bulb moment
BT, as part of its Agile transformation, has widened its Agile footprint into the demand-side of its business. This is being achieved by using Agile techniques in a forum called a...
Alan Armitage, Peter Wisniewski, Alan de-Ste-Croix
CCGRID
2007
IEEE
15 years 10 months ago
Standardization of an API for Distributed Resource Management Systems
Today’s cluster and grid environments demand the usage of product-specific APIs and tools for developing distributed applications. We give an overview of the Distributed Resour...
Peter Tröger, Hrabri Rajic, Andreas Haas, Pio...
COLCOM
2007
IEEE
15 years 10 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
122
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
An Instant Messaging Framework for Flexible Interaction with Rich Clients
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to ...
Matthias Book, Volker Gruhn
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 10 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...