Sciweavers

706 search results - page 105 / 142
» Configuration Management
Sort
View
CN
2007
146views more  CN 2007»
13 years 7 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
14 years 27 days ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
ICDE
2003
IEEE
108views Database» more  ICDE 2003»
14 years 9 months ago
MEMS-based Disk Buffer for Streaming Media Servers
The performance of streaming media servers has been limited due to the dual requirements of high throughput and low memory use. Although disk throughput has been enjoying a 40% an...
Raju Rangaswami, Zoran Dimitrijevic, Edward Y. Cha...
GI
2010
Springer
13 years 5 months ago
Extended Workflow Flexibility using Rule-Based Adaptation Patterns with Eventing Semantics
: In several industry scenarios, it is often the case that an existing reference workflow has to be adapted according to specific context factors, which might even change at runtim...
Markus Döhring, Birgit Zimmermann, Eicke Gode...
IM
2007
13 years 9 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu