Sciweavers

741 search results - page 134 / 149
» Human-Centered Systems for Business Services
Sort
View
ACSAC
1998
IEEE
13 years 11 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
AICCSA
2007
IEEE
99views Hardware» more  AICCSA 2007»
13 years 11 months ago
An Efficient Processor Allocation Strategy that Maintains a High Degree of Contiguity among Processors in 2D Mesh Connected Mult
Two strategies are used for the allocation of jobs to processors connected by mesh topologies: contiguous allocation and non-contiguous allocation. In noncontiguous allocation, a ...
Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ab...
EEE
2004
IEEE
13 years 11 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
DEBU
2007
75views more  DEBU 2007»
13 years 7 months ago
SQL Anywhere: An Embeddable DBMS
We present an overview of the embeddability features of SQL Anywhere, a full-function relational database system designed for frontline business environments with minimal administ...
Ivan T. Bowman, Peter Bumbulis, Dan Farrar, Anil K...
COMCOM
2004
84views more  COMCOM 2004»
13 years 7 months ago
A dynamic pricing scheme for e-content at multiple levels-of-service
Businesses selling multimedia rich software or e-content are growing in the Internet. The e-content can be downloaded or streamed immediately after an on-line transaction. Since I...
Srinivasan Jagannathan, Kevin C. Almeroth