Sciweavers

3108 search results - page 530 / 622
» An Approach to Incremental Design of Distributed Embedded Sy...
Sort
View
SAC
2004
ACM
15 years 10 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
CASES
2009
ACM
15 years 11 months ago
Fine-grain performance scaling of soft vector processors
Embedded systems are often implemented on FPGA devices and 25% of the time [2] include a soft processor— a processor built using the FPGA reprogrammable fabric. Because of their...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...
PEPM
2007
ACM
15 years 10 months ago
Behavioral similarity matching using concrete source code templates in logic queries
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identification of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...
139
Voted
CACM
2008
84views more  CACM 2008»
15 years 4 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
86
Voted
AIME
2009
Springer
15 years 11 months ago
Computer Vision: A Plea for a Constructivist View
Computer vision is presented and discussed under two complementary views. The positivist view provides a formal background under which vision is approached as a problem-solving tas...
Catherine Garbay