Sciweavers

1481 search results - page 158 / 297
» Software controlled power management
Sort
View
104
Voted
CCS
2008
ACM
15 years 3 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
15 years 6 months ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...
129
Voted
OTM
2007
Springer
15 years 8 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
122
Voted
EDOC
2006
IEEE
15 years 8 months ago
Services and Networks management through embedded devices and SOA
In this paper we present an embedded device able to manage the remote boot of network nodes by means of Wake on LAN (WoL) through Internet and Wide Area Network, presenting it as ...
Virgilio Gilart-Iglesias, Francisco Maciá P...
SOUPS
2005
ACM
15 years 7 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller