Sciweavers

480 search results - page 63 / 96
» policy 2004
Sort
View
AUSFORENSICS
2004
13 years 9 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ECIS
2004
13 years 9 months ago
An ethnographic study of IS investment appraisal
Both academics and practitioners have invested considerably in the information systems evaluation arena, yet rewards remain elusive. The aim of this paper is to provide rich insig...
Debra Howcroft, Robert McDonald
ECIS
2001
13 years 9 months ago
Towards sustainable quality of service in interconnection agreements: Implications from information asymmetry
This paper analyses the structure of the Internet marketplace and the business relationships of key players involved in network services provision. A brief overview of existing pr...
Ioanna D. Constantiou, Nikolaos A. Mylonopoulos
JVM
2004
127views Education» more  JVM 2004»
13 years 9 months ago
Towards Scalable Multiprocessor Virtual Machines
A multiprocessor virtual machine benefits its guest operating system in supporting scalable job throughput and request latency--useful properties in server consolidation where ser...
Volkmar Uhlig, Joshua LeVasseur, Espen Skoglund, U...
ATAL
2004
Springer
14 years 29 days ago
Decentralized Markov Decision Processes with Event-Driven Interactions
Decentralized MDPs provide a powerful formal framework for planning in multi-agent systems, but the complexity of the model limits its usefulness. We study in this paper a class o...
Raphen Becker, Shlomo Zilberstein, Victor R. Lesse...