Sciweavers

2669 search results - page 28 / 534
» Improvement of a configuration management system
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
14 years 10 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
CLUSTER
2004
IEEE
14 years 11 months ago
Configurable Network Processing for Mobile Agents on the Internet
This paper presents a framework for building and deploying protocols for migrating mobile agents over the Internet. The framework enables network protocols for agent migration to b...
Ichiro Satoh
COOPIS
2004
IEEE
15 years 3 months ago
Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System
Increasing demands for interconnectivity, adaptivity and flexibility are leading to distributed component-based systems (DCBS) where components may dynamically join and leave a sys...
Giovanni Russello, Michel R. V. Chaudron, Maarten ...
SIGUCCS
2005
ACM
15 years 5 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
GECCO
2010
Springer
170views Optimization» more  GECCO 2010»
15 years 4 months ago
Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution
Technology scaling has offered advantages to embedded systems, such as increased performance, more available memory and reduced energy consumption. However, scaling also brings a...
José Manuel Colmenar, José L. Risco-...