Sciweavers

409 search results - page 41 / 82
» Considering Time in Designing Large-Scale Systems for Scient...
Sort
View
89
Voted
ICNP
2007
IEEE
15 years 6 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...
SAGA
2005
Springer
15 years 5 months ago
Self-replication, Evolvability and Asynchronicity in Stochastic Worlds
We consider temporal aspects of self-replication and evolvability – in particular, the massively asynchronous parallel and distributed nature of living systems. Formal views of s...
Chrystopher L. Nehaniv
102
Voted
ACSAC
2002
IEEE
15 years 4 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
RTCSA
2007
IEEE
15 years 6 months ago
Tardiness Bounds for EDF Scheduling on Multi-Speed Multicore Platforms
Multicore platforms, which include several processing cores on a single chip, are being widely touted as a solution to heat and energy problems that are impediments to single-core...
Hennadiy Leontyev, James H. Anderson
ICCCN
2007
IEEE
15 years 6 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang