Sciweavers

3712 search results - page 710 / 743
» Role-Based Access Control
Sort
View
GECCO
2010
Springer
170views Optimization» more  GECCO 2010»
14 years 12 days ago
Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution
Technology scaling has offered advantages to embedded systems, such as increased performance, more available memory and reduced energy consumption. However, scaling also brings a...
José Manuel Colmenar, José L. Risco-...
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 6 days ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong
TES
2001
Springer
14 years 22 hour ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ICNP
2000
IEEE
14 years 3 hour ago
Differentiated Predictive Fair Service for TCP Flows
The majority of the traffic (bytes) flowing over the Internet today have been attributed to the Transmission Control Protocol (TCP). This strong presence of TCP has recently spu...
Ibrahim Matta, Liang Guo
ACMDIS
2000
ACM
13 years 12 months ago
PaperButtons: Expanding a Tangible User Interface
: Expanding the functionality of a successful system is always a challenge; the initial simplicity and ease-of-use is easily lost in the process. Experience indicates that this pro...
Elin Rønby Pedersen, Tomas Sokoler, Les Nel...