Sciweavers

706 search results - page 23 / 142
» Clone-Aware Configuration Management
Sort
View
CN
2004
108views more  CN 2004»
13 years 9 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
SOUPS
2010
ACM
13 years 10 months ago
The impact of social navigation on privacy policy configuration
Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been app...
Andrew Besmer, Jason Watson, Heather Richter Lipfo...
GSN
2009
Springer
155views Sensor Networks» more  GSN 2009»
14 years 1 months ago
Distributed Network Configuration for Wavelet-Based Compression in Sensor Networks
En-route data compression is fundamental to reduce the power consumed for data gathering in sensor networks. Typical in-network compression schemes involve the distributed computat...
Paula Tarrío, Giuseppe Valenzise, Godwin Sh...
AINA
2008
IEEE
13 years 11 months ago
Flexible Address Configurations for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks
A number of IEEE 802.15.4 devices can be connected by a tree topology as proposed by ZigBee specification. Address configuration in tree-based ZigBee networks needs to assign ever...
Li-Hsing Yen, Wei-Ting Tsai
ADAEUROPE
2010
Springer
13 years 7 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...