Sciweavers

223 search results - page 40 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
DAC
2007
ACM
14 years 8 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
EAGC
2003
Springer
14 years 21 days ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
13 years 11 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ECOOPW
2003
Springer
14 years 21 days ago
Advancing the State of the Art in Run-Time Inspection
levels of abstraction. Lacking well-established technologies and models for representing and accessing program dynamics, tools must use ad-hoc mechanisms. This limits reuse and int...
Robert E. Filman, Katharina Mehner, Michael Haupt
RTSS
2005
IEEE
14 years 1 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar