Sciweavers

2111 search results - page 17 / 423
» How to Program Pervasive Systems
Sort
View
207
Voted
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
16 years 1 months ago
How to Determine a Good Multi-Programming Level for External Scheduling
Scheduling/prioritization of DBMS transactions is important for many applications that rely on database backends. A convenient way to achieve scheduling is to limit the number of ...
Bianca Schroeder, Mor Harchol-Balter, Arun Iyengar...
105
Voted
HOTOS
2003
IEEE
15 years 5 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ICDCS
2002
IEEE
15 years 5 months ago
Balancing Performance, Energy, and Quality in Pervasive Computing
We describe Spectra, a remote execution system for batterypowered clients used in pervasive computing. Spectra enables applications to combine the mobility of small devices with t...
Jason Flinn, SoYoung Park, Mahadev Satyanarayanan
ICOIN
2001
Springer
15 years 4 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
91
Voted
USS
2004
15 years 1 months ago
Fixing Races for Fun and Profit: How to Use access(2)
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
Drew Dean, Alan J. Hu