Sciweavers

23988 search results - page 4558 / 4798
» Social Network Computing
Sort
View
EUROPAR
2009
Springer
15 years 9 months ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein
NBIS
2009
Springer
15 years 9 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
ICICS
2001
Springer
15 years 8 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
UM
2001
Springer
15 years 8 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
ACSAC
2000
IEEE
15 years 8 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
« Prev « First page 4558 / 4798 Last » Next »