Sciweavers

3031 search results - page 458 / 607
» SNMS - Shadow Network Management System
Sort
View
CUZA
2002
129views more  CUZA 2002»
15 years 3 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
127
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
IFIP
2010
Springer
15 years 1 months ago
Drivers of B2B Software Purchase Decisions
. Organizations are increasingly turning to large, enterprise-wide software systems as potential solutions to managing complex business-to-business (B2B) relationships. These syste...
Claudia Loebbecke, Thomas Weiss, Philip Powell, Ch...
SIGMOD
2004
ACM
126views Database» more  SIGMOD 2004»
16 years 3 months ago
StreaMon: An Adaptive Engine for Stream Query Processing
StreaMon is the adaptive query processing engine of the STREAM prototype Data Stream Management System (DSMS) [4]. A fundamental challenge in many DSMS applications (e.g., network...
Shivnath Babu, Jennifer Widom
SECURWARE
2008
IEEE
15 years 10 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...