Sciweavers

1583 search results - page 65 / 317
» The Quorum Deployment Problem
Sort
View
LISA
2001
15 years 4 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
NAACL
2010
15 years 1 months ago
Detecting Emails Containing Requests for Action
Automatically finding email messages that contain requests for action can provide valuable assistance to users who otherwise struggle to give appropriate attention to the actionab...
Andrew Lampert, Robert Dale, Cécile Paris
SIGSOFT
2010
ACM
15 years 1 months ago
Software economies
Software construction has typically drawn on engineering metaphors like building bridges or cathedrals, which emphasize architecture, specification, central planning, and determin...
David F. Bacon, Eric Bokelberg, Yiling Chen, Ian A...
130
Voted
USS
2010
15 years 1 months ago
Realization of RF Distance Bounding
One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a ...
Kasper Bonne Rasmussen, Srdjan Capkun
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 1 months ago
Interference-Aware Channel Assignments with Seamless Multi-Channel Monitoring in Wireless Mesh Networks
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the...
Sunghun Kim 0002, Jongsub Cha, Joongsoo Ma