Sciweavers

113 search results - page 21 / 23
» Operator and radio resource sharing in multi-carrier environ...
Sort
View
ISI
2004
Springer
14 years 29 days ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
IJAMC
2008
85views more  IJAMC 2008»
13 years 7 months ago
Scalable reputation management with trustworthy user selection for P2P MMOGs
: Recent research on Peer-to-Peer Massively Multiplayer Online Games (P2P MMOGs) has tried to find more scalable and affordable solutions to build virtual environments via the reso...
Guan-Yu Huang, Shun-Yun Hu, Jehn-Ruey Jiang
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 2 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
IPPS
2007
IEEE
14 years 1 months ago
Green Supercomputing in a Desktop Box
The advent of the Beowulf cluster in 1994 provided dedicated compute cycles, i.e., supercomputing for the masses, as a cost-effective alternative to large supercomputers, i.e., su...
Wu-chun Feng, Avery Ching, Chung-Hsing Hsu
JTAER
2010
100views more  JTAER 2010»
13 years 6 months ago
Determinants of Consumers' Perceived Trust in IT-Ecosystems
Digital ecosystems, or IT-ecosystems (ITEs), are composed of multiple and independent entities such as individuals, organizations, services, software, and applications. Together, ...
Klaus-Peter Wiedmann, Nadine Hennigs, Dieter Varel...