Sciweavers

1266 search results - page 190 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
169
Voted
IFIP
2007
Springer
15 years 10 months ago
In-Time Role-Specific Notification as Formal Means to Balance Agile Practices in Global Software Development Settings
In global software development (GSD) projects, distributed teams collaborate to deliver high-quality software. Project managers need to control these development projects, which in...
Dindin Wahyudin, Matthias Heindl, Benedikt Eckhard...
IPPS
2003
IEEE
15 years 9 months ago
Modeling Parallel Applications Performance on Heterogeneous Systems
The current technologies have made it possible to execute parallel applications across heterogeneous platforms. However, the performance models available do not provide adequate m...
Jameela Al-Jaroodi, Nader Mohamed, Hong Jiang, Dav...
115
Voted
ITCC
2002
IEEE
15 years 8 months ago
A Methodology for Collection Selection in Heterogeneous Contexts
In this paper we demonstrate that in an ideal Distributed Information Retrieval environment, taking the ability of each collection server to return relevant documents into account...
Faiza Abbaci, Michel Beigbeder, Jacques Savoy
CCR
2002
113views more  CCR 2002»
15 years 3 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
MMMACNS
2005
Springer
15 years 9 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer