Sciweavers

20 search results - page 4 / 4
» D3S: Debugging Deployed Distributed Systems
Sort
View
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
13 years 11 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
EMS
2009
IEEE
13 years 11 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
TAICPART
2006
IEEE
131views Education» more  TAICPART 2006»
13 years 10 months ago
Bogor: A Flexible Framework for Creating Software Model Checkers
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. With the proliferation of multicore arch...
Robby, Matthew B. Dwyer, John Hatcliff
IPSN
2010
Springer
13 years 11 months ago
Diagnostic powertracing for sensor node failure analysis
Troubleshooting unresponsive sensor nodes is a significant challenge in remote sensor network deployments. This paper introduces the tele-diagnostic powertracer, an in-situ troub...
Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael L...
MM
2006
ACM
181views Multimedia» more  MM 2006»
13 years 10 months ago
Peer-to-peer multimedia applications
In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent...
Jin Li