Sciweavers

666 search results - page 92 / 134
» A Persistent Hyper-Programming System
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 5 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 4 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
HPDC
2008
IEEE
14 years 4 months ago
DataLab: transactional data-parallel computing on an active storage cloud
Active storage clouds are an attractive platform for executing large data intensive workloads found in many fields of science. However, active storage presents new system managem...
Brandon Rich, Douglas Thain
ATAL
2007
Springer
14 years 4 months ago
Combinatorial resource scheduling for multiagent MDPs
Optimal resource scheduling in multiagent systems is a computationally challenging task, particularly when the values of resources are not additive. We consider the combinatorial ...
Dmitri A. Dolgov, Michael R. James, Michael E. Sam...
ACSAC
2005
IEEE
14 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth