Sciweavers

1444 search results - page 236 / 289
» The end of users
Sort
View

Publication
198views
15 years 29 days ago
Real time policy based management of workflows for SLA Adherence
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
ACMSE
2008
ACM
14 years 11 months ago
Education and design: using human-computer interaction case studies to learn
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
CEAS
2008
Springer
14 years 11 months ago
Detecting Known and New Salting Tricks in Unwanted Emails
Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mo...
André Bergholz, Gerhard Paass, Frank Reicha...
APSCC
2006
IEEE
14 years 11 months ago
GlobalWatch: A Distributed Service Grid Monitoring Platform with High Flexibility and Usability
GlobalWatch is a distributed platform to monitor various resources of grid platforms so as to improve the flexibility and usability of grid systems. In order to enhance the flexib...
Sheng Di, Hai Jin, Shengli Li, Ling Chen, Chengwei...
CONEXT
2005
ACM
14 years 11 months ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati