Sciweavers

201 search results - page 29 / 41
» Information security in networkable Windows-based operating ...
Sort
View
CMG
2008
13 years 10 months ago
Computing Missing Service Demand Parameters for Performance Models
One of the challenges in building analytic performance models such as queuing network models is obtaining service demands for the various workloads and various devices. While some...
Daniel A. Menascé
IDTRUST
2009
ACM
14 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
IEEESCC
2007
IEEE
14 years 3 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
IJAIT
2002
82views more  IJAIT 2002»
13 years 9 months ago
Interleaved Backtracking in Distributed Constraint Networks
The adaptation of software technology to distributed environments is an important challenge today. In this work we combine parallel and distributed search. By this way we add the ...
Youssef Hamadi
RTSS
1999
IEEE
14 years 1 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...