Sciweavers

1457 search results - page 203 / 292
» Privacy Challenges for Database Systems
Sort
View
CIDR
2007
111views Algorithms» more  CIDR 2007»
13 years 11 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
OOPSLA
2004
Springer
14 years 3 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
CHIMIT
2007
ACM
14 years 2 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CHI
2002
ACM
14 years 10 months ago
Introducing instant messaging and chat in the workplace
We report on our experiences of introducing an instant messaging and group chat application into geographically distributed workgroups. We describe a number of issues we encounter...
James D. Herbsleb, David L. Atkins, David G. Boyer...
PERCOM
2009
ACM
14 years 5 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...