Sciweavers

395 search results - page 71 / 79
» Monitoring Architectural Properties in Dynamic Component-Bas...
Sort
View
104
Voted
DAC
2007
ACM
16 years 1 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
89
Voted
NOMS
2002
IEEE
139views Communications» more  NOMS 2002»
15 years 5 months ago
Active connection management in Internet services
We propose a new connection management architecture for clustered Internet services called Active Connection Management (ACM) to improve the availability, quality of service, and ...
Mike Y. Chen, Eric A. Brewer
135
Voted
IFIP
2005
Springer
15 years 5 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
112
Voted
COOPIS
2004
IEEE
15 years 4 months ago
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications
Abstract. QoS-aware distributed applications such as certain Multimedia and Ubiquitous Computing applications can benefit greatly from the provision of QoS guarantees from the unde...
Roberto Speicys Cardoso, Fabio Kon
104
Voted
CACM
2008
84views more  CACM 2008»
15 years 15 days ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...