Sciweavers

5254 search results - page 944 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
SIGOPS
2008
156views more  SIGOPS 2008»
13 years 10 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
IJHPCA
2007
116views more  IJHPCA 2007»
13 years 10 months ago
Pricing for Utility-Driven Resource Management and Allocation in Clusters
Users perceive varying levels of utility for each different job completed by the cluster. Therefore, there is a need for existing cluster Resource Management Systems (RMS) to prov...
Chee Shin Yeo, Rajkumar Buyya
IMCS
2007
78views more  IMCS 2007»
13 years 10 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
TISSEC
2008
202views more  TISSEC 2008»
13 years 10 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
AICOM
2004
100views more  AICOM 2004»
13 years 10 months ago
Query rewriting with symmetric constraints
Abstract. We address the problem of answering queries using expressive symmetric inter-schema constraints which allow to establish mappings between several heterogeneous informatio...
Christoph Koch