Sciweavers

486 search results - page 96 / 98
» policy 2005
Sort
View
OOPSLA
2005
Springer
14 years 3 months ago
Relational queries over program traces
Instrumenting programs with code to monitor runtime behavior is a common technique for profiling and debugging. In practice, instrumentation is either inserted manually by progra...
Simon Goldsmith, Robert O'Callahan, Alexander Aike...
WINE
2005
Springer
155views Economy» more  WINE 2005»
14 years 3 months ago
Economic Analysis of Networking Technologies for Rural Developing Regions
Abstract. Providing network connectivity to rural regions in the developing world is an economically challenging problem especially given the low income levels and low population d...
Shridhar Mubaraq Mishra, John Hwang, Dick Filippin...
CASES
2005
ACM
13 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
CNSR
2005
IEEE
210views Communications» more  CNSR 2005»
13 years 11 months ago
A Framework for Self-Management of Hybrid Wireless Networks Using Autonomic Computing Principles
The dramatic increase in the number of mobile subscribers has put a significant resource and service provisioning strain on current cellular networks in particular in terms of mu...
Chong Shen, Dirk Pesch, James Irvine
DIM
2005
ACM
13 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...