Sciweavers

121 search results - page 14 / 25
» Decision Evaluation of Three Flood Management Strategies
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
JTAER
2010
109views more  JTAER 2010»
13 years 6 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
VTC
2007
IEEE
14 years 2 months ago
UMTS Non Real-Time Sessions Channel Switching Emulation
— We discuss here a scheme to improve the Rel 99 UMTS radio resource management. The article focuses on the two different types of transport channel: shared and dedicated. It eva...
Hugues van Peteghem, Laurent Schumacher
ASPLOS
2009
ACM
14 years 8 months ago
Dynamic prediction of collection yield for managed runtimes
The growth in complexity of modern systems makes it increasingly difficult to extract high-performance. The software stacks for such systems typically consist of multiple layers a...
Michal Wegiel, Chandra Krintz
EDOC
2009
IEEE
13 years 11 months ago
Process SEER: A Tool for Semantic Effect Annotation of Business Process Models
A key challenge in devising solutions to a range of problems associated with business process management: process life cycle management, compliance management, enterprise process ...
Kerry Hinge, Aditya K. Ghose, George Koliadis