Sciweavers

700 search results - page 6 / 140
» Enterprise Computing
Sort
View
IAW
2003
IEEE
14 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
GLOBECOM
2006
IEEE
14 years 3 months ago
Resource Optimization Subject to a Percentile Response Time SLA for Enterprise Computing
— We consider a set of computer resources used by a service provider to host enterprise applications subject to service level agreements. We present an approach for resource opti...
Kaiqi Xiong, Harry G. Perros
EUROPAR
2005
Springer
14 years 3 months ago
Modeling Machine Availability in Enterprise and Wide-Area Distributed Computing Environments
In this paper, we consider the problem of modeling machine availability in enterprise-area and wide-area distributed computing settings. Using availability data gathered from three...
Daniel Nurmi, John Brevik, Richard Wolski
IADIS
2004
13 years 11 months ago
Using EAI to build public access Web-based information systems
Enterprise Application Integration (EAI) techniques are today widely adopted to build Enterprise Information Systems. Moreover the increasing reliability of tools and techniques s...
Nicola Aloia, Cesare Concordia, Sabrina Tardelli
EDOC
2009
IEEE
14 years 1 months ago
A Goal-Oriented Requirements Modelling Language for Enterprise Architecture
Methods for enterprise architecture, such as TOGAF, acknowledge the importance of requirements engineering in the development of enterprise architectures. Modelling support is nee...
Dick A. C. Quartel, Wilco Engelsman, Henk Jonkers,...