Sciweavers

859 search results - page 99 / 172
» Security for Key Management Interfaces
Sort
View
HPDC
2003
IEEE
15 years 7 months ago
Resource-Aware Stream Management with the Customizable dproc Distributed Monitoring Mechanisms
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...
122
Voted
ISCAPDCS
2001
15 years 3 months ago
AMOS-SDDS: A Scalable Distributed Data Manager for Windows Multicomputers
Known parallel DBMS offer at present only static partitioning schemes. Adding a storage node is then a cumbersome operation that typically requires the manual data redistribution....
Yakham Ndiaye, Aly Wane Diene, Witold Litwin, Tore...
ENVSOFT
2007
126views more  ENVSOFT 2007»
15 years 2 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium ...
Jeroen P. van der Sluijs
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CCS
2004
ACM
15 years 8 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...