Sciweavers

2310 search results - page 272 / 462
» Managing System and Active-Content Integrity
Sort
View
UIST
2005
ACM
14 years 1 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...
PDC
2004
ACM
14 years 1 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
JITECH
2007
147views more  JITECH 2007»
13 years 8 months ago
Re-engineering at LeCroy Corporation: The move to component-based systems
This case study discusses two related aspects that are becoming increasingly important in today’s software development practice: re-engineering of a monolithic system into a com...
Julia Kotlarsky
COOPIS
2004
IEEE
13 years 12 months ago
Component-Based Dynamic QoS Adaptations in Distributed Real-Time and Embedded Systems
Large scale distributed real time and embedded (DRE) applications are complex entities that are often composed of different subsystems and have stringent Quality of Service (QoS) r...
Praveen Kaushik Sharma, Joseph P. Loyall, George T...