Sciweavers

3149 search results - page 167 / 630
» IT security risk management
Sort
View
CIDR
2009
148views Algorithms» more  CIDR 2009»
13 years 10 months ago
The Case for a Structured Approach to Managing Unstructured Data
The challenge of managing unstructured data represents perhaps the largest data management opportunity for our community since managing relational data. And yet we are risking let...
AnHai Doan, Jeffrey F. Naughton, Akanksha Baid, Xi...
DSOM
2007
Springer
14 years 3 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 3 months ago
A Decentralized Key Management Scheme in Overlay Multicast Network
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time st...
Xingfeng Guo, Xiaodong Liu, Qionghai Dai
ISPEC
2009
Springer
14 years 4 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
ECBS
2005
IEEE
164views Hardware» more  ECBS 2005»
14 years 2 months ago
The Impact of Agile Methods on Software Project Management
As more and more software projects engage Agile Methods, there are emerging patterns of success and failure. With growing adoption of Agile Methods, project managers increasingly ...
Michael Coram, Shawn A. Bohner