Sciweavers

25 search results - page 2 / 5
» Role-based System Administration or Who, What, Where, and Ho...
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
EDBT
2012
ACM
254views Database» more  EDBT 2012»
11 years 10 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
AAAI
2007
13 years 10 months ago
Centralized, Distributed or Something Else? Making Timely Decisions in Multi-Agent Systems
In multi-agent systems, agents need to share information in order to make good decisions. Who does what in order to achieve this matters a lot. The assignment of responsibility in...
Tim Harbers, Rajiv T. Maheswaran, Pedro A. Szekely
HICSS
2008
IEEE
99views Biometrics» more  HICSS 2008»
14 years 2 months ago
A Decision Analysis Framework for Emergency Notification
Notification is one of the major tasks for emergency responses. Quick and appropriate notification can save lives and significantly reduce damages. It is, however, challenging to ...
Zhengchuan Xu, Yufei Yuan, Shaobo Ji
HICSS
2005
IEEE
187views Biometrics» more  HICSS 2005»
14 years 1 months ago
Change and Resistance Help for the Practitioner of Change
Change and the resistance to change has been a common occurrence probably since before recorded time. It is normal to resist that which may bring unfamiliarity and the unknown int...
Richard W. Egan, Jerry Fjermestad