Sciweavers

285 search results - page 55 / 57
» Grid Infrastructure Monitoring as Reliable Information Servi...
Sort
View
IJWIN
2006
119views more  IJWIN 2006»
13 years 5 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
CCS
2006
ACM
13 years 9 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
CBMS
2006
IEEE
13 years 9 months ago
A Distributed Workflow Management System for Automated Medical Image Analysis and Logistics
Advances in medical image analysis have increased the need to integrate and deploy image analysis software in daily clinical routine and in epidemiological studies. We developed a...
Jeroen G. Snel, Sílvia Delgado Olabarriaga,...
ASPLOS
2006
ACM
13 years 11 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
13 years 11 months ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...