Sciweavers

1568 search results - page 247 / 314
» Requirements and Services for Metadata Management
Sort
View

Publication
341views
16 years 10 months ago
Incentive Compatible Mechanisms for Decentralized Supply Chain Formation
In this thesis, we describe a decentralized supply chain formation problem where the supply chain planner or a central design authority (CDA) is faced with the decision of choosi...
Nikesh Kumar Srivastava

Publication
184views
16 years 9 months ago
Design and Evaluation of Feedback Consolidation for ABR Point-to-Multipoint Connections in ATM Networks
The available bit rate (ABR) service is proposed to transport data traffic in asynchronous transfer mode (ATM) networks. ABR is unique because the network switches can indicate to ...
Sonia Fahmy, Raj Jain, Rohit Goyal, Bobby Vandalor...
PERCOM
2006
ACM
15 years 10 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
IEEEARES
2009
IEEE
15 years 6 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 5 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...