Sciweavers

285 search results - page 52 / 57
» Grid Infrastructure Monitoring as Reliable Information Servi...
Sort
View
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
IM
2007
13 years 9 months ago
A Generic Application-Oriented Performance Instrumentation for Multi-Tier Environments
— In this paper, we present a design for a generic, open, application-oriented performance instrumentation of multitier applications. Measurements are performed through configur...
Markus Schmid, Marcus Thoss, Thomas Termin, Reinho...
WWW
2004
ACM
14 years 8 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
VEE
2012
ACM
234views Virtualization» more  VEE 2012»
12 years 3 months ago
REEact: a customizable virtual execution manager for multicore platforms
With the shift to many-core chip multiprocessors (CMPs), a critical issue is how to effectively coordinate and manage the execution of applications and hardware resources to overc...
Wei Wang, Tanima Dey, Ryan W. Moore, Mahmut Aktaso...
ICC
2009
IEEE
151views Communications» more  ICC 2009»
13 years 5 months ago
Mapping Techniques for UWB Positioning
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...
E. Arias-de-Reyna, Umberto Mengali