Sciweavers

14824 search results - page 2707 / 2965
» Security - Introduction
Sort
View
USENIX
2003
15 years 4 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
ECIS
2000
15 years 4 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...
LISA
1998
15 years 4 months ago
A Visual Approach for Monitoring Logs
Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most ...
Luc Girardin, Dominique Brodbeck
IRMA
2000
15 years 4 months ago
Remote control for videoconferencing
We have designed, implemented, and deployed a camera control system and a conference controller that provide remote control capabilities for videoconferencing over the Internet. T...
Marcia Perry, Deborah A. Agarwal
DS
1997
104views Database» more  DS 1997»
15 years 4 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
« Prev « First page 2707 / 2965 Last » Next »