Sciweavers

3031 search results - page 396 / 607
» SNMS - Shadow Network Management System
Sort
View
IJNSEC
2006
81views more  IJNSEC 2006»
15 years 4 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
CSCWD
2005
Springer
15 years 6 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
MIE
2008
123views Healthcare» more  MIE 2008»
15 years 5 months ago
Implementation of an electronic medication system and disregarded power of the record
Though hospitals managers wish to have a unified medication system, physicians continue double registration of prescriptions. The traditions of prescribing both electronically and ...
Henriette Mabeck
DOLAP
2010
ACM
15 years 2 months ago
Towards OLAP query reformulation in peer-to-peer data warehousing
Inter-business collaborative contexts prefigure a distributed scenario where companies organize and coordinate themselves to develop common and shared opportunities. Traditional b...
Matteo Golfarelli, Federica Mandreoli, Wilma Penzo...
ATC
2006
Springer
15 years 8 months ago
TOBAB: A Trend-Oriented Bandwidth Adaptive Buffering in Peer-to-Peer Streaming System
Multimedia streaming application is increasingly popular. P2P mode makes it much more suitable for large-scale users to participate into one single application. However, most effor...
Sirui Yang, Hai Jin, Xuping Tu