Sciweavers

2310 search results - page 364 / 462
» Managing System and Active-Content Integrity
Sort
View
CORR
2008
Springer
185views Education» more  CORR 2008»
13 years 8 months ago
Realizing Fast, Scalable and Reliable Scientific Computations in Grid Environments
The practical realization of managing and executing large scale scientific computations efficiently and reliably is quite challenging. Scientific computations often invo...
Yong Zhao, Ioan Raicu, Ian T. Foster, Mihael Hateg...
CHI
2008
ACM
14 years 8 months ago
The personal project planner: planning to organize personal information
Prototyping and evaluation combine to explore ways that an effective, integrative organization of project-related information might emerge as a by-product of a person's effor...
William Jones, Predrag V. Klasnja, Andrea Civan, M...
CSE
2009
IEEE
14 years 2 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 2 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
ECTEL
2007
Springer
14 years 2 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...