Sciweavers

2632 search results - page 177 / 527
» Management Issues in Eda
Sort
View
ITICSE
2010
ACM
15 years 9 months ago
Skills and knowledge for hire: leeds source-it
We present a pilot for a student consultancy service offering students the opportunity to work with internal and external clients on real life projects to learn and enhance trans...
Royce Neagle, Alison Marshall, Roger Boyle
ISN
1995
Springer
15 years 8 months ago
Intelligent Remote Monitoring
Intelligent monitoring facilities are of paramount importance in both service and network management as they provide the capability to monitor quality of service and utilisation pa...
George Pavlou, Kevin M. T. McCarthy, George Mykoni...
USENIX
2003
15 years 5 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
SPRINGSIM
2007
15 years 5 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
WWW
2002
ACM
16 years 5 months ago
Improvements in practical aspects of optimally scheduling web advertising
We addressed two issues concerning the practical aspects of optimally scheduling web advertising proposed by Langheinrich et al. [5], which scheduling maximizes the total number o...
Atsuyoshi Nakamura