Sciweavers

2957 search results - page 516 / 592
» Code analysis and CS-XML
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
APSEC
2002
IEEE
15 years 4 months ago
An Automated Refactoring Approach to Design Pattern-Based Program Transformations in Java Programs
Software often needs to be modified for accommodating requirements changes through the software life cycle. To deal with several accidental requirements changes related to softwa...
Sang-Uk Jeon, Joon-Sang Lee, Doo-Hwan Bae
DATE
2002
IEEE
154views Hardware» more  DATE 2002»
15 years 4 months ago
Low Power Error Resilient Encoding for On-Chip Data Buses
As technology scales toward deep submicron, on-chip interconnects are becoming more and more sensitive to noise sources such as power supply noise, crosstalk, radiation induced ef...
Davide Bertozzi, Luca Benini, Giovanni De Micheli
INFOCOM
2002
IEEE
15 years 4 months ago
SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks
—We propose SWAN, a stateless network model which uses distributed control algorithms to deliver service differentiation in mobile wireless ad hoc networks in a simple, scalable ...
Gahng-Seop Ahn, Li-Hsiang Sun, Andras Veres, Andre...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 4 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys