Sciweavers

1040 search results - page 26 / 208
» Resource Usage Verification
Sort
View
ESWS
2007
Springer
14 years 3 months ago
A Model-driven Approach for Internal Controls Compliance in Business Processes
Enterprises require mechanisms to ensure that their business processes implement and fulfill internal controls in context of regulatory compliance such as Sarbanes Oxley Act. In th...
Kioumars Namiri, Nenad Stojanovic
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
14 years 4 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner
HPDC
2006
IEEE
14 years 3 months ago
Filecules in High-Energy Physics: Characteristics and Impact on Resource Management
Grid computing has reached the stage where deployments are mature and many collaborations run in production mode. Mature Grid deployments offer the opportunity for revisiting and ...
Adriana Iamnitchi, Shyamala Doraimani, Gabriele Ga...
LCN
2006
IEEE
14 years 3 months ago
Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANs
In a shared medium network like the 802.11b WLAN, predicting the quality of VoIP calls from the resource usage of the wireless medium is highly desirable. Analyzing the bandwidth ...
Miroslaw Narbutt, Mark Davis
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...