Sciweavers

1129 search results - page 139 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
ICFP
2008
ACM
15 years 10 months ago
Flask: staged functional programming for sensor networks
Severely resource-constrained devices present a confounding challenge to the functional programmer: we are used to having powerful ion facilities at our fingertips, but how can we...
Geoffrey Mainland, Greg Morrisett, Matt Welsh
IPSN
2009
Springer
15 years 4 months ago
Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment
Wireless sensor networks are untethered infrastructures that are easy to deploy and have limited visual impact—a key asset in monitoring heritage buildings of artistic interest....
Matteo Ceriotti, Luca Mottola, Gian Pietro Picco, ...
IADIS
2004
14 years 11 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu
CLOUDCOM
2010
Springer
14 years 8 months ago
Reliability Support in Virtual Infrastructures
Through the recent emergence of joint resource and network virtualization, dynamic composition and provisioning of time-limited and isolated virtual infrastructures is now possible...
Guilherme Piegas Koslovski, Wai-Leong Yeow, C&eacu...
SIGMETRICS
1997
ACM
164views Hardware» more  SIGMETRICS 1997»
15 years 2 months ago
File Server Scaling with Network-Attached Secure Disks
By providing direct data transfer between storage and client, network-attached storage devices have the potential to improve scalability for existing distributed file systems (by...
Garth A. Gibson, David Nagle, Khalil Amiri, Fay W....