Sciweavers

5790 search results - page 123 / 1158
» Distributed programming with distributed authorization
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
USENIX
1994
13 years 11 months ago
A Usage Profile and Evaluation of a Wide-Area Distributed File System
The evolution of the Andrew File System (AFS) into a wide-area distributed file system has encouraged collaboration and information dissemination on a much broader scale than ever...
Mirjana Spasojevic, Mahadev Satyanarayanan
KER
2006
107views more  KER 2006»
13 years 10 months ago
Partitioning strategies for distributed association rule mining
In this paper a number of alternative strategies for distributed/parallel association rule mining are investigated. The methods examined make use of a data structure, the T-tree, ...
Frans Coenen, Paul H. Leng
CHI
2005
ACM
14 years 10 months ago
Traveling blues: the effect of relocation on partially distributed teams
This experimental study looks at how relocation affected the collaboration patterns of partially-distributed work groups. Partially distributed teams have part of their membership...
Nathan Bos, Judith S. Olson, Arik Cheshin, Yong-Su...
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
14 years 4 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo