Sciweavers

3031 search results - page 96 / 607
» SNMS - Shadow Network Management System
Sort
View
148
Voted
SIGSOFT
2004
ACM
15 years 9 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra
152
Voted
WWW
2005
ACM
16 years 4 months ago
WEBCAP: a capacity planning tool for web resource management
A staggering number of multimedia applications are being introduced every day. Yet, the inordinate delays encountered in retrieving multimedia documents make it difficult to use t...
Sami Habib, Maytham Safar
132
Voted
AINA
2006
IEEE
15 years 9 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
122
Voted
EXPERT
2011
131views more  EXPERT 2011»
14 years 7 months ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic
120
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson