Sciweavers

3337 search results - page 163 / 668
» Resource Management
Sort
View
HPDC
1998
IEEE
15 years 6 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
ECIS
2003
15 years 3 months ago
Analysis of interrelations between business models and knowledge management strategies in consulting firms
Knowledge is an important matter for consulting firms − as a resource, as a product or service, and as a trigger for internal value creation processes. Therefore, a strategy for...
Sven Grolik, Dirk Kalmring, Dietrich Lehner, Chiar...
ECBS
2005
IEEE
79views Hardware» more  ECBS 2005»
15 years 8 months ago
"SelfService": A Theoretical Protocol for Autonomic Distribution of Services in P2P Communities
In this paper, we present a theoretical protocol for autonomic distribution of services in a P2P environment, as well as the results of its simulated implementation. Our objective...
Fabrice Saffre, Håvard Rast Blok
CCS
2004
ACM
15 years 7 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ELPUB
2007
ACM
15 years 6 months ago
Evaluating Digital Humanities Resources: The LAIRAH Project Checklist and the Internet Shakespeare Editions Project
The following paper presents a case study of the way that the research done by the LAIRAH project may be applied in the case of a real digital resource for humanities scholarship....
Claire Warwick, Melissa Terras, Isabel Galina, Pau...