Sciweavers

7080 search results - page 1108 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
JNCA
2007
128views more  JNCA 2007»
15 years 3 months ago
Embedded web server-based home appliance networks
Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
M. Can Filibeli, Öznur Özkasap, M. Reha ...
STTT
2010
122views more  STTT 2010»
15 years 2 months ago
Rodin: an open toolset for modelling and reasoning in Event-B
Event-B is a formal method for system-level modelling and analysis. Key features of Event-B are the use of set theory as a modelling notation, the use of ent to represent systems a...
Jean-Raymond Abrial, Michael J. Butler, Stefan Hal...
CCS
2009
ACM
15 years 11 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
FPL
2005
Springer
100views Hardware» more  FPL 2005»
15 years 10 months ago
HAIL: A Hardware-Accelerated Algorithm for Language Identification
A hardware-accelerated algorithm has been designed to automatically identify the primary languages used in documents transferred over the Internet. The algorithm has been implemen...
Charles M. Kastner, G. Adam Covington, Andrew A. L...
IPPS
2007
IEEE
15 years 10 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet
« Prev « First page 1108 / 1416 Last » Next »