Sciweavers

6907 search results - page 248 / 1382
» Securing distributed adaptation
Sort
View
HOTOS
2009
IEEE
15 years 8 months ago
Security Impact Ratings Considered Harmful
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived securi...
Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Pri...
CSREASAM
2003
15 years 5 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
JSS
2010
111views more  JSS 2010»
15 years 2 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
IPPS
1998
IEEE
15 years 8 months ago
Resource Reservation for Adaptive QOS Mapping in Real-Time Mach
In this paper, we describe an adaptive QOS mapping scheme where the QOS parameters of applications are mapped into resource requirements dynamically, and the resources for the appl...
Tatsuo Nakajima
ECOOPW
1998
Springer
15 years 8 months ago
Object-Oriented Frameworks: Architecture Adaptability
Quality and economical aspects of software development are strictly related. Adaptability, as a feature of quality, fosters reuse and the resulting economies of scale. Domain anal...
Paolo Predonzani, Giancarlo Succi, Andrea Valerio,...