Sciweavers

1372 search results - page 102 / 275
» Implementing an ITIL-Based IT Service Management Measurement...
Sort
View
141
Voted
COMPUTER
1998
131views more  COMPUTER 1998»
15 years 3 months ago
Windows NT Clustering Service
ER ABSTRACTIONS ter service uses several abstractions— including resource, resource dependencies, and resource groups—to simplify both the cluster service itself and user-visib...
Rod Gamache, Rob Short, Mike Massa
149
Voted
GRID
2006
Springer
15 years 3 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
121
Voted
SIMUTOOLS
2008
15 years 5 months ago
PlanetSim: an extensible framework for overlay network and services simulations
Research community on distributed systems, and in particular on peer-to-peer systems, needs tools for evaluating their own protocols and services, as well as against other protoco...
Jordi Pujol Ahulló, Pedro García L&o...
140
Voted
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 10 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
155
Voted
ISSA
2004
15 years 5 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee