Sciweavers

981 search results - page 94 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
AMKM
2003
Springer
15 years 6 months ago
Improving Organizational Memory through Agents for Knowledge Discovery in Database
In this article we describe a computational architecture called MC2 that brings together a set of tools that contribute to the knowledge management process by allowing for the cre...
João José Vasco Furtado, Viní...
CASCON
1996
126views Education» more  CASCON 1996»
15 years 2 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
RTSS
1998
IEEE
15 years 5 months ago
A Dynamic Quality of Service Middleware Agent for Mediating Application Resource Usage
High-bandwidth applications with time-dependent resource requirements demand certain resource level assurances in order to operate correctly. Quality of Service resource managemen...
Scott A. Brandt, Gary J. Nutt, Toby Berk, James E....
COOPIS
2004
IEEE
15 years 5 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
SAC
2010
ACM
15 years 8 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz