Sciweavers

295 search results - page 40 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
IEAAIE
2011
Springer
12 years 11 months ago
Modeling Users of Crisis Training Environments by Integrating Psychological and Physiological Data
Abstract. This paper describes aspects of a training environment for crisis decision makers who, notoriously, operate in highly stressful and unpredictable situations. Training suc...
Gabriella Cortellessa, Rita D'Amico, Marco Pagani,...
PVLDB
2008
100views more  PVLDB 2008»
13 years 7 months ago
Scalable query result caching for web applications
The backend database system is often the performance bottleneck when running web applications. A common approach to scale the database component is query result caching, but it fa...
Charles Garrod, Amit Manjhi, Anastasia Ailamaki, B...
CIS
2008
Springer
13 years 9 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
NETWORKING
2007
13 years 9 months ago
Using PANA for Mobile IPv6 Bootstrapping
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...
ICEIS
2009
IEEE
14 years 2 months ago
Invisible Deployment of Integration Processes
Abstract. Due to the changing scope of data management towards the management of heterogeneous and distributed systems and applications, integration processes gain in importance. T...
Matthias Böhm, Dirk Habich, Wolfgang Lehner, ...