Sciweavers

1081 search results - page 184 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 3 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
IPSN
2007
Springer
14 years 2 months ago
Dozer: ultra-low power data gathering in sensor networks
Environmental monitoring is one of the driving applications in the domain of sensor networks. The lifetime of such systems is envisioned to exceed several years. To achieve this l...
Nicolas Burri, Pascal von Rickenbach, Roger Watten...
IROS
2006
IEEE
96views Robotics» more  IROS 2006»
14 years 2 months ago
Topological Mapping Inspired by Techniques in DNA Sequence Alignment
Abstract— This paper introduces a method of building topological maps using sequences of images and the approximate string matching algorithm, which is commonly used in DNA seque...
Alan M. Zhang, Lindsay Kleeman, R. Andrew Russell
COLCOM
2009
IEEE
14 years 1 months ago
Unified analytical models for Location Management costs and optimum design of location areas
—Within collaborative computing, computer mediated communications are evolving rapidly thanks to the development of new technologies. The facilitation of awareness and discovery ...
Eladio Martin, Ling Liu, Matt Weber, Péter ...
AOSD
2006
ACM
14 years 13 days ago
Reflections on aspects and configurable protocols
The goals of aspect oriented software development (AOSD) and frameworks for configurable protocols (CPs) are similar in many respects. AOSD allows the specification of crosscuttin...
Matti A. Hiltunen, François Taïani, Ri...