Sciweavers

468 search results - page 20 / 94
» The System Administration Maturity Model - SAMM
Sort
View
HPCC
2007
Springer
14 years 22 hour ago
Resource Aggregation and Workflow with Webcom
Efficient exploitation of the aggregate resources available to a researcher is a challenging and real problem. The challenge becomes all the greater when researchers who collaborat...
Oisín Curran, Paddy Downes, John Cunniffe, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 12 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ECIS
2004
13 years 9 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
VL
2006
IEEE
170views Visual Languages» more  VL 2006»
14 years 2 months ago
A Lightweight Model for End Users' Domain-Specific Data
Many end user programming tools lack adequate support for domain-specific data. We will design a lightweight representation for categories of data, called “topes,” and develop...
Christopher Scaffidi
CCGRID
2009
IEEE
14 years 2 months ago
Scheduling Strategies for Cycle Scavenging in Multicluster Grid Systems
The use of today’s multicluster grids exhibits periods of submission bursts with periods of normal use and even of idleness. To avoid resource contention, many users employ obse...
Omer Ozan Sonmez, Bart Grundeken, Hashim H. Mohame...