Sciweavers

706 search results - page 32 / 142
» Configuration Management
Sort
View
SIGMOD
2007
ACM
141views Database» more  SIGMOD 2007»
14 years 10 months ago
Storage workload estimation for database management systems
Modern storage systems are sophisticated. Simple directattached storage devices are giving way to storage systems that are shared, flexible, virtualized and network-attached. Toda...
Oguzhan Ozmen, Kenneth Salem, Mustafa Uysal, M. Ho...
BPM
2007
Springer
165views Business» more  BPM 2007»
14 years 1 months ago
Modeling Requirements for Value Configuration Design
Breadth and depth complexity are key challenges in achieving business process fusion as the enabler for value configuration design. The PARM framework is proposed as the requiremen...
Eng Chew, Igor Hawryszkiewycz, Michael Soanes
IJISEC
2008
188views more  IJISEC 2008»
13 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
KMGOV
2004
Springer
14 years 3 months ago
Ontology-Enabled E-gov Service Configuration: An Overview of the OntoGov Project
Abstract. For electronic government initiatives to succeed, in addition to modernising the front office, attention should be also paid in order to streamline, reorganise and suppor...
Efthimios Tambouris, Stelios Gorilas, Gregory Kava...
CLUSTER
2004
IEEE
13 years 9 months ago
Configurable Network Processing for Mobile Agents on the Internet
This paper presents a framework for building and deploying protocols for migrating mobile agents over the Internet. The framework enables network protocols for agent migration to b...
Ichiro Satoh