Sciweavers

274 search results - page 50 / 55
» Resource Instantiation Policies for Software Process Environ...
Sort
View
MOBISYS
2011
ACM
12 years 10 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IRI
2007
IEEE
14 years 1 months ago
An Object-Oriented Approach for High Availability of Applications Integration
The integration of networked applications, especially those requiring continuous access to shared information resources and databases, may be effected by scheduled unavailability ...
Jameela Al-Jaroodi, Nader Mohamed
IPSN
2007
Springer
14 years 1 months ago
Energy-optimized image communication on resource-constrained sensor platforms
Energy-efficient image communication is one of the most important goals for a large class of current and future sensor network applications. This paper presents a quantitative com...
Dong-U Lee, Hyungjin Kim, Steven Tu, Mohammad H. R...
AMCS
2011
341views Mathematics» more  AMCS 2011»
13 years 2 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica