Sciweavers

2355 search results - page 98 / 471
» Benefits of Enterprise Systems Use
Sort
View
CCS
2007
ACM
14 years 12 hour ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
FAST
2010
13 years 10 months ago
SRCMap: Energy Proportional Storage Using Dynamic Consolidation
We investigate the problem of creating an energy proportional storage system through power-aware dynamic storage consolidation. Our proposal, Sample-ReplicateConsolidate Mapping (...
Akshat Verma, Ricardo Koller, Luis Useche, Raju Ra...
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
14 years 2 months ago
Exploring the Adoption, Utility, and Social Influences of Social Bookmarking in a Corporate Environment
This paper describes an ongoing technology investigation to assess the value and utility of social bookmarking on a corporate intranet. We hypothesize that social bookmarking woul...
Laurie E. Damianos, Donna L. Cuomo, John Griffith,...
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
13 years 9 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...