Sciweavers

171 search results - page 23 / 35
» About Some Specificities of Embedded Multiagent Systems Desi...
Sort
View
SIGSOFT
2010
ACM
14 years 7 months ago
Software engineering and wireless sensor networks: happy marriage or consensual divorce?
The development of wireless sensor networks (WSNs) software today is tackled by a code-and-fix process that relies solely on the primitive constructs provided by the operating sys...
Gian Pietro Picco
CHI
2005
ACM
14 years 11 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
HOST
2008
IEEE
15 years 4 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 9 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ENGL
2007
168views more  ENGL 2007»
14 years 9 months ago
A Novel Star Field Approach for Shape Indexing in CBIR Systems
—This paper presents a novel hybrid method for content based visual information retrieval (CBIR) that combines shape analysis of objects in image with their automatic indexing by...
Oleg Starostenko, Alberto Chávez-Arag&oacut...