Sciweavers

5838 search results - page 162 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
153
Voted
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
15 years 5 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
ICDCS
2002
IEEE
15 years 8 months ago
Cooperative Computing for Distributed Embedded Systems
The next generation of computing systems will be embedded, in a virtually unbounded number, and dynamically connected. The current software, network architectures, and their assoc...
Cristian Borcea, Deepa Iyer, Porlin Kang, Akhilesh...
113
Voted
FM
2003
Springer
107views Formal Methods» more  FM 2003»
15 years 8 months ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
103
Voted
MSR
2006
ACM
15 years 9 months ago
How long did it take to fix bugs?
The number of bugs (or fixes) is a common factor used to measure the quality of software and assist bug related analysis. For example, if software files have many bugs, they may b...
Sunghun Kim, E. James Whitehead Jr.
139
Voted
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 8 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...