Sciweavers

2517 search results - page 324 / 504
» Secure Deployment of Components
Sort
View
IJHPCA
2006
77views more  IJHPCA 2006»
13 years 9 months ago
An Interoperability Approach to System Software, Tools, and Libraries for Clusters
Systems software for clusters typically derives from a multiplicity of sources: the kernel itself, software associated with a particular distribution, site-specific purchased or o...
Ewing L. Lusk, Narayan Desai, Rick Bradshaw, Andre...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 9 months ago
SWI-Prolog and the Web
Prolog is an excellent tool for representing and manipulating data written in formal languages as well as natural language. Its safe semantics and automatic memory management make...
Jan Wielemaker, Zhisheng Huang, Lourens van der Me...
PUC
2006
89views more  PUC 2006»
13 years 9 months ago
UbiqStack: a taxonomy for a ubiquitous computing software stack
This paper describes a taxonomy for a ubiquitous computing software stack called UbiqStack. Through the lens of the UbiqStack taxonomy we survey a variety of subsystems designed to...
Martin Modahl, Bikash Agarwalla, T. Scott Saponas,...
PERCOM
2010
ACM
13 years 7 months ago
Connectivity monitoring in wireless sensor networks
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
CLOUDCOM
2010
Springer
13 years 7 months ago
Cost-Optimal Outsourcing of Applications into the Clouds
Abstract--Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities fo...
Immanuel Trummer, Frank Leymann, Ralph Mietzner, W...