Sciweavers

1499 search results - page 283 / 300
» A Software Architectural Approach to Security by Design
Sort
View
DAC
2005
ACM
16 years 22 days ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
15 years 6 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
APCSAC
2005
IEEE
15 years 5 months ago
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
Fibonacci Cubes (FCs), together with the enhanced and extended forms, are a family of interconnection topologies formed by diluting links from binary hypercube. While they scale up...
Zhang Xinhua, Peter Loh
117
Voted
SENSYS
2003
ACM
15 years 5 months ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
KYOTODL
2000
87views more  KYOTODL 2000»
15 years 1 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...