Sciweavers

501 search results - page 87 / 101
» Access control and key management for mobile agents
Sort
View
IM
2003
13 years 10 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
CASES
2010
ACM
13 years 6 months ago
Resource recycling: putting idle resources to work on a composable accelerator
Mobile computing platforms in the form of smart phones, netbooks, and personal digital assistants have become an integral part of our everyday lives. Moving ahead to the future, m...
Yongjun Park, Hyunchul Park, Scott A. Mahlke, Sukj...
ICSE
2009
IEEE-ACM
13 years 6 months ago
Architecture-driven self-adaptation and self-management in robotics systems
We describe an architecture-centric design and implementation approach for building self-adapting and selfmanaging robotics systems. The basis of our approach is the concept of me...
George Edwards, Joshua Garcia, Hossein Tajalli, Da...
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
CATE
2004
128views Education» more  CATE 2004»
13 years 10 months ago
A Service-oriented Approach for Pervasive Learning Grid
This investigation proposed a service-oriented approach based on a pervasive learning grid for solving the difficulties associated with sharing learning resources distributed on d...
Ching-Jung Liao, Fan-Chuan Yang