Sciweavers

1372 search results - page 23 / 275
» Implementing an ITIL-Based IT Service Management Measurement...
Sort
View
JSAC
2008
70views more  JSAC 2008»
13 years 7 months ago
Managing a Peer-to-Peer Data Storage System in a Selfish Society
We compare two possible mechanisms to manage a peer-to-peer storage system, where participants can store data online on the disks of peers in order to increase data availability an...
Patrick Maillé, László Toka
ICDE
1992
IEEE
116views Database» more  ICDE 1992»
13 years 11 months ago
An Index Implementation Supporting Fast Recovery for the POSTGRES Storage System
This paper presents two algorithms for maintaining Btree index consistency in a DBMS which does not use write-ahead logging (WAL). One algorithm is similar to shadow paging, but i...
Mark Sullivan, Michael A. Olson
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
HICSS
2005
IEEE
176views Biometrics» more  HICSS 2005»
14 years 1 months ago
Architecture for Customer Relationship Management Approaches in Financial Services
The majority of financial services companies in Germany and Switzerland have, with varying objectives and success, conducted customer relationship management (CRM) implementation ...
Malte Geib, Annette Reichold, Lutz Kolbe, Walter B...
DIM
2007
ACM
13 years 11 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...