Sciweavers

7059 search results - page 1319 / 1412
» Bayesian network management
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
BIS
2010
197views Business» more  BIS 2010»
13 years 6 months ago
Ubiquitous Microblogging: A Flow-Based Front-End for Information Logistics
The success of information supply strongly depends on successful user adoption. This especially is the case for the integration of non-human information sources deriving from ubiqu...
Martin Böhringer, Martin Gaedke
ICOODB
2010
171views Database» more  ICOODB 2010»
13 years 6 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
IKE
2010
13 years 6 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
IPPS
2010
IEEE
13 years 6 months ago
Initial characterization of parallel NFS implementations
Parallel NFS (pNFS) is touted as an emergent standard protocol for parallel I/O access in various storage environments. Several pNFS prototypes have been implemented for initial v...
Weikuan Yu, Jeffrey S. Vetter
« Prev « First page 1319 / 1412 Last » Next »