Sciweavers

82 search results - page 10 / 17
» Dissecting Configuration Management Policies
Sort
View
COOPIS
2004
IEEE
15 years 1 months ago
Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System
Increasing demands for interconnectivity, adaptivity and flexibility are leading to distributed component-based systems (DCBS) where components may dynamically join and leave a sys...
Giovanni Russello, Michel R. V. Chaudron, Maarten ...
WEBNET
1998
14 years 11 months ago
Some Recommendations on Building Proxy Caching Service
: In this paper, we present our research on WWW caching proxies. We drew some key conclusions on the service properties and caching policies, according to the results of our analys...
Andrey Naumenko
64
Voted
ISCC
2005
IEEE
15 years 3 months ago
Traffic Engineering in Multihomed Sites
It is expected that IPv6 multihomed sites will obtain as many global prefixes as direct providers they have, so Traffic Engineering techniques currently used in IPv4 multihomed si...
Marcelo Bagnulo, Alberto García-Martí...
CCS
2008
ACM
14 years 11 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
81
Voted
EWSN
2006
Springer
15 years 9 months ago
Power Management for Bluetooth Sensor Networks
Low power is a primary concern in the field of wireless sensor networks. Bluetooth has often been labeled as an inappropriate technology in this field due to its high power consump...
Luca Negri, Lothar Thiele