Sciweavers

294 search results - page 35 / 59
» Conflict Analysis for Management Policies
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
OSDI
2000
ACM
13 years 9 months ago
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently
Out-of-core applications consume physical resources at a rapid rate, causing interactive applications sharing the same machine to exhibit poor response times. This behavior is the...
Angela Demke Brown, Todd C. Mowry
ATAL
2009
Springer
14 years 2 months ago
Aerogility: an intelligent decision support system for managing service-based aftermarkets
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
EOR
2008
97views more  EOR 2008»
13 years 7 months ago
Optimization models for the single delay management problem in public transportation
Passengers travelling in public transportation networks often have to use different lines to cover the trip from their origin to the desired destination. As a consequence, the rel...
Géraldine Heilporn, Luigi De Giovanni, Mart...