Sciweavers

3031 search results - page 451 / 607
» SNMS - Shadow Network Management System
Sort
View
EJIS
2006
79views more  EJIS 2006»
15 years 3 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
NOSSDAV
1992
Springer
15 years 8 months ago
Adaptive, Best-Effort Delivery of Digital Audio and Video Across Packet-Switched Networks
: We present an overview of a "best-effort" transport protocol that supports conferencing with digital audio and video across interconnected packet switched networks. The...
Kevin Jeffay, Donald L. Stone, Terry Talley, F. Do...
SECURWARE
2008
IEEE
15 years 10 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
COMPUTER
1999
95views more  COMPUTER 1999»
15 years 3 months ago
Wide-Area Computing: Resource Sharing on a Large Scale
abstract over a complex set of resources and provide a high-level way to share and manage them over the network. To be effective, such a system must address the challenges posed by...
Andrew S. Grimshaw, Adam Ferrari, Frederick Knabe,...
ICWS
2003
IEEE
15 years 5 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti