Sciweavers

2275 search results - page 332 / 455
» A Deployment System for Pervasive Computing
Sort
View
HOTOS
1999
IEEE
15 years 8 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
GECCO
2008
Springer
182views Optimization» more  GECCO 2008»
15 years 5 months ago
Avida-MDE: a digital evolution approach to generating models of adaptive software behavior
Increasingly, high-assurance applications rely on autonomic systems to respond to changes in their environment. The inherent uncertainty present in the environment of autonomic sy...
Heather Goldsby, Betty H. C. Cheng
CSCW
2004
ACM
15 years 4 months ago
Building Connections among Loosely Coupled Groups: Hebb's Rule at Work
Awareness of others' interests can lead to fruitful collaborations, friendships and positive social change. Interviews of groups involved in both research and corporate work r...
Scott Carter, Jennifer Mankoff, P. Goddi
DSE
1998
80views more  DSE 1998»
15 years 3 months ago
The Voltan application programming environment for fail-silent processes
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Dave Black, C. Low, Santosh K. Shrivastava
RTAS
2005
IEEE
15 years 9 months ago
A Distributed Real-Time Embedded Application for Surveillance, Detection, and Tracking of Time Critical Targets
As computer systems become increasingly internetworked, there is a growing class of distributed realtime embedded (DRE) applications that have characteristics and present challeng...
Joseph P. Loyall, Richard E. Schantz, David Corman...