Sciweavers

1372 search results - page 184 / 275
» Implementing an ITIL-Based IT Service Management Measurement...
Sort
View
GLVLSI
2009
IEEE
158views VLSI» more  GLVLSI 2009»
15 years 3 months ago
Exploration of memory hierarchy configurations for efficient garbage collection on high-performance embedded systems
Modern embedded devices (e.g., PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems include multi...
José Manuel Velasco, David Atienza, Katzali...
AGENTS
1998
Springer
15 years 4 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
ICAC
2009
IEEE
15 years 3 months ago
A decentralized, architecture-based framework for self-growing applications
In large-scale, distributed software systems, an important management undertaking concerns the creation and runtime modification of application instances. This short paper propose...
Ada Diaconescu, Philippe Lalanda
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 5 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
JUCS
2010
162views more  JUCS 2010»
14 years 10 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...