We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
This paper considers the elements and challenges of heterogeneous data management and interdisciplinary collaboration, drawing from the literatures on participatory design, comput...
Karen S. Baker, Steven J. Jackson, Jerome R. Wanet...
Resource allocation is a key problem in autonomic computing. In this paper we use a data center scenario to motivate the need for decentralization and cooperative negotiation, and...
Craig Boutilier, Rajarshi Das, Jeffrey O. Kephart,...