Sciweavers

1324 search results - page 126 / 265
» Automation Controller for Operational IT Management
Sort
View
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 2 months ago
Pervasive Real-Time IT as a Disruptive Technology for the IS Field
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
Steven Alter
ICPPW
2002
IEEE
14 years 1 months ago
Dynamic Expansion of M : N Protection Groups in GMPLS Optical Networks
Abstract— In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic...
David W. Griffith, SuKyoung Lee
SOUPS
2010
ACM
14 years 26 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
PVLDB
2010
166views more  PVLDB 2010»
13 years 7 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
SACMAT
2003
ACM
14 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf