Sciweavers

Share
685 search results - page 137 / 137
» What Can We Expect from Program Verification?
Sort
View
SASN
2006
ACM
10 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
ICSE
2012
IEEE-ACM
8 years 22 days ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou
RTAS
2015
IEEE
4 years 6 months ago
Budgeted generalized rate monotonic analysis for the partitioned, yet globally scheduled uniprocessor model
—This paper solves the challenge of offline response time analysis of independent periodic tasks with constrained deadlines early in the software development cycle, under genera...
Jung-Eun Kim, Tarek F. Abdelzaher, Lui Sha
SAC
2005
ACM
10 years 3 months ago
LighTS: a lightweight, customizable tuple space supporting context-aware applications
The tuple space model inspired by Linda has recently been rediscovered by distributed middleware. Moreover, some researchers also applied it in the challenging scenarios involving...
Gian Pietro Picco, Davide Balzarotti, Paolo Costa
ATAL
2009
Springer
10 years 5 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...
books