Sciweavers

606 search results - page 61 / 122
» Privacy-Enabled Services for Enterprises
Sort
View
DSOM
2007
Springer
15 years 3 months ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...
EOR
2010
88views more  EOR 2010»
14 years 12 months ago
Market-based pricing in grids: On strategic manipulation and computational cost
Grid technologies and the related concepts of utility computing and cloud computing enable the dynamic sourcing of computer resources and services, thus allowing enterprises to cu...
Jochen Stößer, Dirk Neumann, Christof W...
DBSEC
2004
97views Database» more  DBSEC 2004»
15 years 1 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
JUCS
2010
183views more  JUCS 2010»
14 years 10 months ago
User Context and Personalized Learning: a Federation of Contextualized Attention Metadata
: Nowadays, personalized education is a very hot topic in technology enhanced learning (TEL) research. To support students during their learning process, the first step consists in...
Valentin Butoianu, Philippe Vidal, Katrien Verbert...
RE
2010
Springer
14 years 6 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa