Sciweavers

3937 search results - page 585 / 788
» Questioning Ubiquitous Computing
Sort
View
PAM
2010
Springer
15 years 9 months ago
Extracting Intra-domain Topology from mrinfo Probing
Active and passive measurements for topology discovery have known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discov...
Jean-Jacques Pansiot, Pascal Mérindol, Beno...
ACSC
2009
IEEE
15 years 9 months ago
Evaluating the dynamic behaviour of Python applications
The Python programming language is typical among dynamic languages in that programs written in it are not susceptible to static analysis. This makes efficient static program compi...
Alex Holkner, James Harland
111
Voted
ACSC
2009
IEEE
15 years 9 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
122
Voted
SAC
2009
ACM
15 years 9 months ago
Optimal service level allocation in environmentally powered embedded systems
Energy management is a critical concern in the design of embedded systems to prolong the lifetime or to maximize the performance under energy constraints. In particular, the emerg...
Clemens Moser, Jian-Jia Chen, Lothar Thiele
SAC
2009
ACM
15 years 9 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura