Sciweavers

294 search results - page 34 / 59
» Conflict Analysis for Management Policies
Sort
View
WEBNET
1998
13 years 9 months ago
Some Recommendations on Building Proxy Caching Service
: In this paper, we present our research on WWW caching proxies. We drew some key conclusions on the service properties and caching policies, according to the results of our analys...
Andrey Naumenko
DOCENG
2008
ACM
13 years 9 months ago
Merging changes in XML documents using reliable context fingerprints
Different dialects of XML have emerged as ubiquitous document exchange formats. For effective collaboration based on such documents, the capability to propagate edit operations pe...
Sebastian Rönnau, Christian Pauli, Uwe M. Bor...
AAAI
2006
13 years 9 months ago
Contract Enactment in Virtual Organizations: A Commitment-Based Approach
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh
MDM
2001
Springer
138views Communications» more  MDM 2001»
14 years 7 days ago
Operating System and Algorithmic Techniques for Energy Scalable Wireless Sensor Networks
An system-level power management technique for massively distributed wireless microsensor networks is proposed. A power aware sensor node model is introduced which enables the embe...
Amit Sinha, Anantha Chandrakasan
ISF
2006
118views more  ISF 2006»
13 years 7 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang