Sciweavers

8118 search results - page 1503 / 1624
» The Newton Application Architecture
Sort
View
133
Voted
SACMAT
2006
ACM
15 years 7 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
108
Voted
AGILEDC
2005
IEEE
15 years 7 months ago
Costs of Compliance: Agile in an Inelastic Organization
Doing agile development in a relatively inelastic environment, where policies and procedures are virtually unchangeable, creates an impedance mismatch between the agile team and i...
John J. Cunningham
BROADNETS
2005
IEEE
15 years 7 months ago
Modeling and performance evaluation of ISCSI storage area networks
Abstract— This paper provides a concise modeling and performance evaluation of the iSCSI storage area network (SAN) architecture and protocol. SANs play a key role in business co...
Christoph M. Gauger, Martin Köhn, Sebastian G...
123
Voted
KBSE
2005
IEEE
15 years 7 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...
114
Voted
SSDBM
2005
IEEE
111views Database» more  SSDBM 2005»
15 years 7 months ago
Querying Streaming Geospatial Image Data: The GeoStreams Project
Data products generated from remotely-sensed, geospatial imagery (RSI) used in emerging areas, such as global climatology, environmental monitoring, land use, and disaster managem...
Quinn Hart, Michael Gertz
« Prev « First page 1503 / 1624 Last » Next »