Sciweavers

422 search results - page 43 / 85
» Risk management for distributed authorization
Sort
View
MOBISYS
2010
ACM
15 years 2 months ago
NAPman: network-assisted power management for wifi devices
WiFi radios in smart-phones consume a significant amount of power when active. The 802.11 standard allows these devices to save power through an energy-conserving Power Save Mode ...
Eric Rozner, Vishnu Navda, Ramachandran Ramjee, Sh...
122
Voted
CASCON
2007
138views Education» more  CASCON 2007»
15 years 2 months ago
SLA-driven business process management in SOA
The management of non-functional goals, or Service Level Agreements (SLA), in the development of business processes in a Service Oriented Architecture often requires much manual a...
Vinod Muthusamy, Hans-Arno Jacobsen, Phil Coulthar...
125
Voted
WOSP
2010
ACM
15 years 7 months ago
Agile resource management in a virtualized data center
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
101
Voted
GEOS
2007
Springer
15 years 6 months ago
A Rule-Based Description Framework for the Composition of Geographic Information Services
SDIs offer access to a wealth of distributed data sources through standardised service interfaces. Recently, also geoprocessing capabilities are offered as services in SDIs. Combin...
Michael Lutz, Roberto Lucchi, Anders Friis-Christe...
105
Voted
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes