Sciweavers

762 search results - page 59 / 153
» Security Contexts in Autonomic Systems
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 12 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
ICAC
2009
IEEE
15 years 6 months ago
Experiences with scheduling and mapping games for adaptive distributed systems: summary
We apply the concept of “games with a purpose” to NPcomplete mapping and scheduling problems in distributed systems and report our experiences. The particular context is a sch...
Bin Lin, Peter A. Dinda
ICAT
2003
IEEE
15 years 5 months ago
Intelligent Wearable Assistance System for Communicating with Interactive Electronic Media
The wearable computer that can understand the context of human life and communicate autonomously with various electronic media in a ubiquitous computing environment would be very ...
Yongho Seo, Jin Choi, Taewoo Han, Hyun Seung Yang
HUC
2003
Springer
15 years 5 months ago
Building World Models by Ray-Tracing within Ceiling-Mounted Positioning Systems
Context-aware computing in location-aware environments demands the combination of real world position with a computational world model to infer context. We present a novel approach...
Robert K. Harle, Andy Hopper
IS
2007
14 years 11 months ago
The leganet system: Freshness-aware transaction routing in a database cluster
We consider the use of a database cluster for Application Service Provider (ASP). In the ASP context, applications and databases can be update-intensive and must remain autonomous....
Stéphane Gançarski, Hubert Naacke, E...