Sciweavers

715 search results - page 49 / 143
» Consistency in multi-viewpoint design of enterprise informat...
Sort
View
EUROSYS
2010
ACM
14 years 4 months ago
Barricade: Defending Systems Against Operator Mistakes
In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the ...
Fabio Oliveira, Andrew Tjang, Ricardo Bianchini, R...
CBSE
2005
Springer
14 years 1 months ago
Architecture Based Deployment of Large-Scale Component Based Systems: The Tool and Principles
After a component based system is developed, it has to be deployed into a target environment. As the system becomes much larger and more complex and the environment becomes open an...
Ling Lan, Gang Huang, Liya Ma, Meng Wang, Hong Mei...
IWIA
2005
IEEE
14 years 1 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
DGO
2004
118views Education» more  DGO 2004»
13 years 9 months ago
Human-Centered Systems for Business Services
The focus of this paper reports a collaborative effort with the State of New Jersey in designing and building a human-centered e-government portal to support small and medium size...
Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun
CIKM
2010
Springer
13 years 6 months ago
StableBuffer: optimizing write performance for DBMS applications on flash devices
Flash devices have been widely used in embedded systems, laptop computers, and enterprise servers. However, the poor random writes have been an obstacle to running write-intensive...
Yu Li, Jianliang Xu, Byron Choi, Haibo Hu