Sciweavers

1347 search results - page 182 / 270
» Towards a Secure Data Stream Management System
Sort
View
SACMAT
2003
ACM
15 years 10 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
167
Voted
WMASH
2004
ACM
15 years 10 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
IEEEARES
2007
IEEE
15 years 11 months ago
Event-Based Monitoring of Open Source Software Projects
Project management traditionally has a strong focus on human reporting that fits well a tightly coupled form of organization to ensure the quality of project reporting. For loosel...
Dindin Wahyudin, A. Min Tjoa
141
Voted
ISORC
2000
IEEE
15 years 9 months ago
Hierarchical Feedback Adaptation for Real Time Sensor-Based Distributed Applications
This paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real-time distributed data-flow applications, such ...
Mihaela Cardei, Ionut Cardei, Rakesh Jha, Allalagh...
KDD
2009
ACM
166views Data Mining» more  KDD 2009»
16 years 5 months ago
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis
Social networks have become a major focus of research in recent years, initially directed towards static networks but increasingly, towards dynamic ones. In this paper, we investi...
Jerry Scripps, Pang-Ning Tan, Abdol-Hossein Esfaha...