Sciweavers

1457 search results - page 203 / 292
» Privacy Challenges for Database Systems
Sort
View
112
Voted
CIDR
2007
111views Algorithms» more  CIDR 2007»
15 years 4 months ago
Moirae: History-Enhanced Monitoring
In this paper, we investigate the benefits and challenges of integrating history into a near-real-time monitoring system; and present a general purpose continuous monitoring engi...
Magdalena Balazinska, YongChul Kwon, Nathan Kuchta...
107
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
CHIMIT
2007
ACM
15 years 6 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
113
Voted
CHI
2002
ACM
16 years 2 months ago
Introducing instant messaging and chat in the workplace
We report on our experiences of introducing an instant messaging and group chat application into geographically distributed workgroups. We describe a number of issues we encounter...
James D. Herbsleb, David L. Atkins, David G. Boyer...
129
Voted
PERCOM
2009
ACM
15 years 9 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...