Sciweavers

1144 search results - page 161 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
IPSN
2007
Springer
15 years 3 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
SIGCOMM
2009
ACM
15 years 4 months ago
A hierarchical model for BGP routing policies
BGP routing policies are mainly used by network operators to enforce business relationships between Autonomous Systems (AS), and to prefer some routes over others. In this paper, ...
Laurent Vanbever, Bruno Quoitin, Olivier Bonaventu...
DSOM
2008
Springer
14 years 11 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
TCIAIG
2010
14 years 4 months ago
Cinematic Visual Discourse: Representation, Generation, and Evaluation
In this paper, we present the design, implementation, and evaluation of an end-to-end camera planning system called Darshak. Darshak automatically constructs cinematic narrative di...
Arnav Jhala, R. Michael Young
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
15 years 11 months ago
Universal Resource Lifecycle Management
This paper presents a model and a tool that allows Web users to define, execute, and manage lifecycles for any artifact available on the Web. In the paper we show the need for life...
Marcos Báez, Fabio Casati, Maurizio Marches...