Sciweavers

468 search results - page 38 / 94
» The System Administration Maturity Model - SAMM
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 1 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 1 months ago
A UML-Driven Enterprise Architecture Case Study
The U.S. Capitol Police (USCP) are responsible for protecting the Capitol Hill complex encompassing the Senate and House office buildings and the Capitol building. Currently, the ...
Frank Armour, Stephen H. Kaisler, Jim Getter, Doug...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
LISA
2007
13 years 10 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
HPCA
1999
IEEE
14 years 12 days ago
Limits to the Performance of Software Shared Memory: A Layered Approach
Much research has been done in fast communication on clusters and in protocols for supporting software shared memory across them. However, the end performance of applications that...
Angelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jasw...