Sciweavers

3337 search results - page 593 / 668
» Resource Management
Sort
View
CCS
2001
ACM
15 years 7 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
IWSAS
2001
Springer
15 years 6 months ago
Model-Based Diagnosis for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
Howard E. Shrobe
SIGUCCS
2000
ACM
15 years 6 months ago
Creating a Help Center from Scratch: A Recipe for Success
Creating a university Help Center from scratch can be a challenging yet very rewarding experience for an IT professional. Buying computers, building networks, and installing softw...
Patrick McKoen
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 6 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
15 years 6 months ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...