Sciweavers

2747 search results - page 242 / 550
» Network externalities in software systems
Sort
View
96
Voted
SAC
2009
ACM
15 years 7 months ago
ERIKA and open-ZB: an implementation for real-time wireless networking
IEEE 802.15.4/ZigBee and TinyOS have been playing an important role in leveraging a new generation of large-scale networked embedded systems. However, based on previous experience...
Paolo Pagano, Mangesh Chitnis, Antonio Romano, Giu...
103
Voted
GRID
2007
Springer
15 years 7 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...
EUROMICRO
1997
IEEE
15 years 5 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
CATE
2004
168views Education» more  CATE 2004»
15 years 2 months ago
Remote e-Learning System for Schools
Experience from the management of distributed computer-based learning resources in schools has been proven to be inefficient and costly. Though commercial software packages are av...
Kai-Pan Mark, Sheung-lun Hung, William Tsang
ENTCS
2008
87views more  ENTCS 2008»
15 years 25 days ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel