Sciweavers

2550 search results - page 17 / 510
» Enterprise Content Management
Sort
View
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
14 years 1 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
HPCA
2007
IEEE
14 years 7 months ago
A Scalable, Non-blocking Approach to Transactional Memory
Transactional Memory (TM) provides mechanisms that promise to simplify parallel programming by eliminating the need for locks and their associated problems (deadlock, livelock, pr...
Hassan Chafi, Jared Casper, Brian D. Carlstrom, Au...
HOTOS
2009
IEEE
13 years 11 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
SAC
2006
ACM
14 years 1 months ago
Evaluation of current architecture frameworks
With the growing importance of enterprise architecture the discussion about how to create or choose the right enterprise architecture framework for a specific organization arose q...
Susanne Leist, Gregor Zellner
ESWA
2002
74views more  ESWA 2002»
13 years 7 months ago
A study on VRM-awareness enterprise websites
Enterprise websites nowadays have become one of the most important conversation channels between the enterprise and its existing/ potential customers (visitors). We envision that ...
Soe-Tsyr Yuan, Ho-Shing Chen