Sciweavers

700 search results - page 95 / 140
» Enterprise Computing
Sort
View
DSN
2005
IEEE
14 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICDCS
2003
IEEE
14 years 3 months ago
Decision-Support Workload Characteristics on a Clustered Database Server from the OS Perspective
A range of database services are being offered on clusters of workstations today to meet the demanding needs of applications with voluminous datasets, high computational and I/O r...
Yanyong Zhang, Jianyong Zhang, Anand Sivasubramani...
ITICSE
2010
ACM
14 years 3 months ago
Skills and knowledge for hire: leeds source-it
We present a pilot for a student consultancy service offering students the opportunity to work with internal and external clients on real life projects to learn and enhance trans...
Royce Neagle, Alison Marshall, Roger Boyle
ICDCSW
2002
IEEE
14 years 2 months ago
TWSAPI: A Generic Teamwork Services Application Programming Interface
One of the problems faced by large, global organizations and enterprises is to effectively enable their employees to collaborate across locations. People need collaborative work s...
Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenk...
PDP
2002
IEEE
14 years 2 months ago
A Jini Framework for Distributed Service Flexibility
Existing distributed middleware technologies and Enterprise Application frameworks lack in support to service flexibility from both the developer’s and user’s point of view. ...
Domenico Cotroneo, Cristiano di Flora, Stefano Rus...