Sciweavers

1183 search results - page 96 / 237
» Risk Management with Benchmarking
Sort
View
AISS
2010
165views more  AISS 2010»
15 years 1 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
TELSYS
2010
140views more  TELSYS 2010»
14 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
SOSP
2003
ACM
16 years 1 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
15 years 10 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara
IMCIM
1995
15 years 7 months ago
Evaluation of Object-Oriented Database Systems
Despite the fact that object-oriented database systems (OODBS) have gained potential as promising database technology for non-standard applications such as computer integrated manu...
Christian Huemer, Gerti Kappel, S. Rausch-Schott, ...