Sciweavers

1889 search results - page 371 / 378
» Evaluating cost taxonomies for information systems managemen...
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
13 years 9 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
ICWS
2009
IEEE
14 years 7 months ago
Scalable and Reliable Location Services through Decentralized Replication
—One of the critical challenges for service oriented computing systems is the capability to guarantee scalable and reliable service provision. This paper presents Reliable GeoGri...
Gong Zhang, Ling Liu, Sangeetha Seshadri, Bhuvan B...
EUROSYS
2006
ACM
14 years 6 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
SOUPS
2010
ACM
14 years 1 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
SOUPS
2009
ACM
14 years 4 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...