EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer Software and Services not elsewhere classified"
Narrow search

Narrow search

Year of publication
Subject
All
Computer Software and Services not elsewhere classified 6 Distributed and Grid Systems 3 Information Systems Management 2 Commodity cluster computing 1 Coordinated CPU?I/O resources scheduling 1 Distributed systems 1 Enterprise grid computing 1 Heterogeneous systems 1 High-performance computing 1 Job scheduling 1 Parallel job scheduling 1 Performance analysis 1 RFID 1 SCADA 1 Space-sharing 1 Ubiquitous Computing 1 architectural framework 1 critical infrastructure 1 cyber-capability 1 cyber-terrorism 1 data management 1 data sharing 1 database 1 healthcare data 1 network 1 privacy 1 privacy preservation 1 supply chain 1
more ... less ...
Online availability
All
Free 6
Type of publication
All
Article 6
Type of publication (narrower categories)
All
Congress Report 3
Language
All
English 6
Author
All
Abawajy, J. H. 2 Abawajy, Jemal 2 Warren, Matthew 2 Al-Neyadi, Fahed 1 Beggs, Christopher 1 Fernando, Harinda 1 Kang, Byeong-Ho 1 Khalil, Ismail 1 Kim, Tai-hoon 1 Kotsis, Gabriele 1 Lee, Young-hoon 1 Leitch, Shona 1 Pardede, Eric 1 Slezak, Dominik 1 Taniar, David 1
more ... less ...
Source
All
BASE 6
Showing 1 - 6 of 6
Cover Image
A privacy preserving service broker architecture for data sharing
Al-Neyadi, Fahed; Abawajy, Jemal - 2010
The problem addressed in this paper is how to ensure data privacy concerns when data is shared between multiple organisations. In domains such as healthcare, there is a need to share privacy-sensitive data among autonomous but cooperating organisations. However, security concerns and compliance...
Persistent link: https://www.econbiz.de/10009483786
Saved in:
Cover Image
Supply chain management security : the weak link of Australian critical infrastructure protection
Warren, Matthew; Leitch, Shona - 2009
Secure management of Australia’s commercial Critical Infrastructure presents ongoing challenges to both the owners of this infrastructure as well as to the Australian Federal government. The security management process is currently managed through high-level information sharing via...
Persistent link: https://www.econbiz.de/10009483952
Saved in:
Cover Image
Safeguarding Australia from cyber-terrorism : a proposed cyber-terrorism SCADA risk framework for industry adoption
Beggs, Christopher; Warren, Matthew - 2009
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to  coordinate cyber-based attacks. This paper identifies...
Persistent link: https://www.econbiz.de/10009483953
Saved in:
Cover Image
A RFID architecture framework for global supply chain applications
Fernando, Harinda; Abawajy, Jemal - 2009
RFID technology promises to revolutionize supply chains and usher in a new era of cost savings, efficiency and business intelligence. The use of low cost RFID devices in supply chain management systems has been increasing dramatically. While a lot of research has been carried out in trying to...
Persistent link: https://www.econbiz.de/10009484054
Saved in:
Cover Image
Adaptive hierarchical scheduling policy for enterprise grid computing systems
Abawajy, J. H. - 2009
In an enterprise grid computing environments, users have access to multiple resources that may be distributed geographically. Thus, resource allocation and scheduling is a fundamental issue in achieving high performance on enterprise grid computing. Most of current job scheduling systems for...
Persistent link: https://www.econbiz.de/10009484117
Saved in:
Cover Image
An efficient adaptive scheduling policy for high-performance computing
Abawajy, J. H. - 2009
The advent of commodity-based high-performance clusters has raised parallel and distributed computing to a new level. However, in order to achieve the best possible performance improvements for large-scale computing problems as well as good resource utilization, efficient resource management and...
Persistent link: https://www.econbiz.de/10009484118
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...