Sciweavers

2517 search results - page 49 / 504
» Secure Deployment of Components
Sort
View
126
Voted
CD
2005
Springer
15 years 8 months ago
Improving Availability in Large, Distributed Component-Based Systems Via Redeployment
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall av...
Marija Mikic-Rakic, Sam Malek, Nenad Medvidovic
MDM
2007
Springer
154views Communications» more  MDM 2007»
15 years 8 months ago
Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems
In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovati...
Oranat Sangratanachaikul, Leping Huang, Shin'ichi ...
133
Voted
ICDCS
2009
IEEE
15 years 11 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
IEEESCC
2008
IEEE
15 years 9 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
GI
2001
Springer
15 years 7 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...