Sciweavers

210 search results - page 37 / 42
» Policy Compliance in Collaborative Systems
Sort
View
CF
2004
ACM
14 years 4 months ago
Predictable performance in SMT processors
Current instruction fetch policies in SMT processors are oriented towards optimization of overall throughput and/or fairness. However, they provide no control over how individual ...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
ACSAC
2002
IEEE
14 years 3 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
SAC
2010
ACM
14 years 5 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
ETELEMED
2009
IEEE
164views Healthcare» more  ETELEMED 2009»
13 years 8 months ago
Research Challenges for Achieving Healthcare Business Process Interoperability
- E-Health systems' interoperability constitutes one of the main challenges of the IT society. E-Health interoperability will not occur without a shared policy and a process f...
Dimitrios Alexandrou, Gregoris Mentzas
SRDS
2010
IEEE
13 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...