Sciweavers

9210 search results - page 1530 / 1842
» Analyzing Real-Time Systems
Sort
View
111
Voted
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
105
Voted
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Selective Channel Feedback Mechanisms for Wireless Multichannel Scheduling
Opportunistic scheduling can significantly improve wireless network performance by exploiting the feedback information that conveys the underlying channel condition. In emerging ...
Young-June Choi, Saewoong Bahk
107
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
90
Voted
ARITH
2005
IEEE
15 years 6 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
ASWEC
2005
IEEE
15 years 6 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
« Prev « First page 1530 / 1842 Last » Next »