Sciweavers

422 search results - page 35 / 85
» Risk management for distributed authorization
Sort
View
91
Voted
SOSP
2003
ACM
15 years 9 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
86
Voted
JNSM
1998
94views more  JNSM 1998»
15 years 7 days ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong
94
Voted
PAKM
2000
15 years 1 months ago
Knowledge Management and Collaboration
We report on a study of the relationship between collaboration and knowledge management. Successful knowledge management projects encourage and enhance collaboration between emplo...
Peter Clarke, Maggie Cooper
90
Voted
QSIC
2005
IEEE
15 years 6 months ago
A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies
Service workflow management which consolidates multiple services to achieve business goals has become a critical issue in service-oriented computing. Due to the unique feature of ...
Jun Yan, Yun Yang, Ryszard Kowalczyk, Xuan Thang N...
112
Voted
ELPUB
2007
ACM
15 years 4 months ago
Cultural Content Management at a New Level: Publishing Theater and Opera Details by Means of Open Technologies from the Web 2.0
Creating Internet services for a specific auditorium involves technical, organizational and sociological challenges to developers, processes and used technologies. Authoring and d...
Markus W. Schranz