Sciweavers

379 search results - page 69 / 76
» An Approach to Automated Agent Deployment in Service-Based S...
Sort
View
ER
1998
Springer
100views Database» more  ER 1998»
15 years 1 months ago
Designing Well-Structured Websites: Lessons to Be Learned from Database Schema Methodology
Abstract. In this paper we argue that many of the problems one may experience while visiting websites today may be avoided if their builders adopt a proper methodology for designin...
Olga De Troyer
ICAC
2005
IEEE
15 years 3 months ago
Decentralised Autonomic Computing: Analysing Self-Organising Emergent Behaviour using Advanced Numerical Methods
When designing decentralised autonomic computing systems, a fundamental engineering issue is to assess systemwide behaviour. Such decentralised systems are characterised by the la...
Tom De Wolf, Giovanni Samaey, Tom Holvoet, Dirk Ro...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 3 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
RTAS
2011
IEEE
14 years 1 months ago
ARCH: Practical Channel Hopping for Reliable Home-Area Sensor Networks
Abstract—Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of...
Mo Sha, Gregory Hackmann, Chenyang Lu
COMPSEC
2004
104views more  COMPSEC 2004»
14 years 9 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu