Sciweavers

2517 search results - page 88 / 504
» Secure Deployment of Components
Sort
View
112
Voted
MIS
2001
Springer
89views Multimedia» more  MIS 2001»
15 years 7 months ago
Multimedia Metacomputing
The concept of multimedia metacomputing involves the formation of a large scale loosely coupled multiprocessing environment capable of performing complex transformations on media ...
Ulrich Marder, Jernej Kovse
125
Voted
EDOC
2002
IEEE
15 years 8 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
126
Voted
AGENTS
1998
Springer
15 years 7 months ago
A Synergy of Agent Components: Social Comparison for Failure Detection
of other components. This abstract presents an implemented illustration of such explicit component synergy and its usefulness in dynamic multi-agent environments. In such environme...
Gal A. Kaminka, Milind Tambe
129
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
IJNSEC
2008
175views more  IJNSEC 2008»
15 years 3 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das