Sciweavers

464 search results - page 53 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
106
Voted
ESEM
2008
ACM
15 years 2 months ago
Socio-technical congruence: a framework for assessing the impact of technical and work dependencies on software development prod
The identification and management of work dependencies is a fundamental challenge in software development organizations. This paper argues that modularization, the traditional tec...
Marcelo Cataldo, James D. Herbsleb, Kathleen M. Ca...
ICSE
2008
IEEE-ACM
16 years 1 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
131
Voted
CODASPY
2012
13 years 8 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
237
Voted
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 5 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
OOPSLA
2005
Springer
15 years 6 months ago
Quantifying the performance of garbage collection vs. explicit memory management
Garbage collection yields numerous software engineering benefits, but its quantitative impact on performance remains elusive. One can compare the cost of conservative garbage col...
Matthew Hertz, Emery D. Berger