Sciweavers

700 search results - page 110 / 140
» Enterprise Computing
Sort
View
CCS
2007
ACM
14 years 1 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
CANDT
2009
14 years 1 months ago
Analyzing (social media) networks with NodeXL
We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate ...
Marc A. Smith, Ben Shneiderman, Natasa Milic-Frayl...
ECAI
2010
Springer
13 years 11 months ago
Learning Aggregation Functions for Expert Search
Abstract. Machine learning techniques are increasingly being applied to problems in the domain of information retrieval and text mining. In this paper we present an application of ...
Ronan Cummins, Mounia Lalmas, Colm O'Riordan
EAGC
2004
Springer
14 years 3 months ago
Overview of an Architecture Enabling Grid Based Application Service Provision
In this short paper we examine the integration of three emerging trends in Information Technology (Utility Computing, Grid Computing, and Web Services) into a new Computing paradig...
Stefan Wesner, Bassem Serhan, Theodosis Dimitrakos...
SIGMOD
2008
ACM
297views Database» more  SIGMOD 2008»
15 years 9 months ago
Automatic Virtual Machine Configuration for Database Workloads
Virtual machine monitors are becoming popular tools for the deployment of database management systems and other enterprise software applications. In this paper, we consider a commo...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem, P...