<--- Back to Details
First PageDocument Content
Computing / System software / Information and communications technology / Network protocols / Computer configuration / Humancomputer interaction / Control Panel / Ubiquitous computing / Universal Plug and Play / Home network / Ambient intelligence / Zero-configuration networking
Date: 2012-11-23 14:19:46
Computing
System software
Information and communications technology
Network protocols
Computer configuration
Humancomputer interaction
Control Panel
Ubiquitous computing
Universal Plug and Play
Home network
Ambient intelligence
Zero-configuration networking

Providing an Integrated User Experience of Networked Media, Devices, and Services Through End-User Composition Mark W. Newman1, Ame Elliott2, Trevor F Smith3 ∗ 1

Add to Reading List

Source URL: trevor.smith.name

Download Document from Source Website

File Size: 3,56 MB

Share Document on Facebook

Similar Documents

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst  Department of Computer Science & Engineering

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst Department of Computer Science & Engineering

DocID: 1xUO7 - View Document

Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich  Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

Network-wide Configuration Synthesis Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev ETH Z¨ urich Abstract. Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reacha

DocID: 1tY1q - View Document

Staccato: A Bug Finder for Dynamic Configuration Updates∗ John Toman1 and Dan Grossman2 1  Department of Computer Science & Engineering

Staccato: A Bug Finder for Dynamic Configuration Updates∗ John Toman1 and Dan Grossman2 1 Department of Computer Science & Engineering

DocID: 1tpe7 - View Document

Build and Maintain a Secure Network and Systems Requirement 1: Install and maintain a firewall configuration to protect cardholder data Firewalls are devices that control computer traffic allowed between an entity’s ne

Build and Maintain a Secure Network and Systems Requirement 1: Install and maintain a firewall configuration to protect cardholder data Firewalls are devices that control computer traffic allowed between an entity’s ne

DocID: 1sJC6 - View Document

Status Report on Software Configuration Management Impact Study Alexander L. Wolf Department of Computer Science University of Colorado at Boulder

Status Report on Software Configuration Management Impact Study Alexander L. Wolf Department of Computer Science University of Colorado at Boulder

DocID: 1suNH - View Document