Sciweavers

3733 search results - page 83 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
WECWIS
2008
IEEE
75views ECommerce» more  WECWIS 2008»
15 years 7 months ago
Price Trust Evaluation in E-service Oriented Applications
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable inform...
Yan Wang 0002, Lei Li, Ee-Peng Lim
CIDR
2009
181views Algorithms» more  CIDR 2009»
15 years 2 months ago
The Case for RodentStore: An Adaptive, Declarative Storage System
Recent excitement in the database community surrounding new applications--analytic, scientific, graph, geospatial, etc.--has led to an explosion in research on database storage sy...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 8 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
IJCSA
2008
237views more  IJCSA 2008»
15 years 1 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir