Sciweavers

700 search results - page 67 / 140
» Enterprise Computing
Sort
View
EDOC
2004
IEEE
14 years 1 months ago
A Logical Viewpoint on Architectures
In this paper we introduce a logical viewpoint on architectures. The logical viewpoint is based on the distinction between symbolic and semantic models of architectures. The core ...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
COMSWARE
2006
IEEE
14 years 1 months ago
VoIP service quality monitoring using active and passive probes
Service providers and enterprises all over the world are rapidly deploying Voice over IP (VoIP) networks because of reduced capital and operational expenditure, and easy creation o...
Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ram...
RAID
2010
Springer
13 years 7 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
DEXA
2009
Springer
138views Database» more  DEXA 2009»
14 years 4 months ago
Evaluating Non-In-Place Update Techniques for Flash-Based Transaction Processing Systems
Recently, flash memory is emerging as the storage device. With price sliding fast, the cost per capacity is approaching to that of SATA disk drives. So far flash memory has been ...
Yongkun Wang, Kazuo Goda, Masaru Kitsuregawa
EDOC
2006
IEEE
14 years 4 months ago
Translating business contract into compliant business processes
This paper presents an approach for translating legalese expression of business contracts into candidate business activities and processes while ensuring their compliance with con...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...