Sciweavers

647 search results - page 37 / 130
» Deployment of Services-Oriented Applications Integrating Phy...
Sort
View
HOTDEP
2008
122views Hardware» more  HOTDEP 2008»
15 years 3 months ago
Dependable Self-Hosting Distributed Systems Using Constraints
We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational...
Qin Yin, Justin Cappos, Andrew Baumann, Timothy Ro...
EMNETS
2007
15 years 5 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
TDSC
2008
102views more  TDSC 2008»
15 years 1 months ago
Temporal Partitioning of Communication Resources in an Integrated Architecture
Integrated architectures in the automotive and avionic domain promise improved resource utilization and enable a better coordination of application subsystems compared to federated...
Roman Obermaisser
ISWC
2000
IEEE
15 years 5 months ago
Enabling Implicit Human Computer Interaction: A Wearable RFID-Tag Reader
Implicit human computer interaction is based on the concept of using user activity in the real world as input to computers. Implicit HCI can help to reduce the problem of user inp...
Albrecht Schmidt, Hans-Werner Gellersen, Christian...
USS
2004
15 years 2 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos