Sciweavers

546 search results - page 105 / 110
» Network Information Flow in Network of Queues
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
DEBS
2008
ACM
13 years 9 months ago
Speculative out-of-order event processing with software transaction memory
In event stream applications, events flow through a network of components that perform various types of operations, e.g., filtering, aggregation, transformation. When the operatio...
Andrey Brito, Christof Fetzer, Heiko Sturzrehm, Pa...
DOCENG
2008
ACM
13 years 9 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
ICIS
2000
13 years 8 months ago
A framework of knowledge management systems: issues and challenges for theory and practice
As the basis of value creation increasingly depends on the leverage of the intangible assets of firms, Knowledge Management Systems (KMS) are emerging as powerful sources of compe...
Jungpil Hahn, Mani R. Subramani
ATAL
2010
Springer
13 years 8 months ago
Intelligent agents for the smart grid
The Intelligent Decentralised Energy-Aware Systems (iDEaS) project at the University of Southampton (see www.ideasproject.info) is developing and demonstrating the application of ...
Perukrishnen Vytelingum, Thomas Voice, Sarvapali D...