Sciweavers

2826 search results - page 375 / 566
» A resource-based analysis of IT sourcing
Sort
View
132
Voted
ACMSE
2006
ACM
15 years 7 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
82
Voted
MSR
2006
ACM
15 years 7 months ago
Where is bug resolution knowledge stored?
ArgoUML uses both CVS and Bugzilla to keep track of bugfixing activities since 1998. A common practice is to reference source code changes resolving a bug stored in Bugzilla by i...
Gerardo Canfora, Luigi Cerulo
IPSN
2005
Springer
15 years 7 months ago
Perpetual environmentally powered sensor networks
— Environmental energy is an attractive power source for low power wireless sensor networks. We present Prometheus, a system that intelligently manages energy transfer for perpet...
Xiaofan Jiang, Joseph Polastre, David E. Culler
MM
2004
ACM
137views Multimedia» more  MM 2004»
15 years 7 months ago
Towards auto-documentary: tracking the evolution of news stories
News videos constitute an important source of information for tracking and documenting important events. In these videos, news stories are often accompanied by short video shots t...
Pinar Duygulu, Jia-Yu Pan, David A. Forsyth
ADHOCNOW
2004
Springer
15 years 7 months ago
Cross-Layer Optimization for High Density Sensor Networks: Distributed Passive Routing Decisions
Abstract. The resource limited nature of WSNs require that protocols implemented on these networks be energy-efficient, scalable and distributed. This paper presents an analysis of...
Primoz Skraba, Hamid K. Aghajan, Ahmad Bahai