Sciweavers

356 search results - page 36 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
DSOM
2007
Springer
14 years 2 months ago
On the Risk Exposure and Priority Determination of Changes in IT Service Management
This paper deals with the Change Management process within IT Service Management. Change Management includes several activities, some of which need to evaluate the risk exposure as...
Jacques Philippe Sauvé, Rodrigo A. Santos, ...
EUROPAR
2007
Springer
14 years 2 months ago
Negotiation Strategies Considering Opportunity Functions for Grid Scheduling
In Grid systems, nontrivial qualities of service have to be provided to users by the resource providers. However, resource management in a decentralized infrastructure is a complex...
Jiadao Li, Kwang Mong Sim, Ramin Yahyapour
HUC
2007
Springer
14 years 2 months ago
How Smart Homes Learn: The Evolution of the Networked Home and Household
Despite a growing desire to create smart homes, we know little about how networked technologies interact with a house’s infrastructure. In this paper, we begin to close this gap ...
Marshini Chetty, Ja-Young Sung, Rebecca E. Grinter
SOUPS
2006
ACM
14 years 2 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...
JCDL
2005
ACM
98views Education» more  JCDL 2005»
14 years 1 months ago
Exploring user perceptions of digital image similarity
The MIDAS project is developing infrastructure and policies for optimal display of digital information on devices with diverse characteristics. In this paper we present the prelim...
Unmil Karadkar, Richard Furuta, Jeevan Joseph John...