Sciweavers

417 search results - page 81 / 84
» Detecting Fault Modules Using Bioinformatics Techniques
Sort
View
121
Voted
DEBS
2008
ACM
15 years 4 months ago
Event-based constraints for sensornet programming
We propose a sensornet programming model based on declarative spatio-temporal constraints on events only, not sensors. Where previous approaches conflate events and sensors becaus...
Jie Mao, John Jannotti, Mert Akdere, Ugur Ç...
144
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
145
Voted
AI
2010
Springer
15 years 2 months ago
Soft arc consistency revisited
The Valued Constraint Satisfaction Problem (VCSP) is a generic optimization problem defined by a network of local cost functions defined over discrete variables. It has applicatio...
Martin C. Cooper, Simon de Givry, M. Sanchez, Thom...
148
Voted
BMCBI
2006
190views more  BMCBI 2006»
15 years 2 months ago
VANTED: A system for advanced data analysis and visualization in the context of biological networks
Background: Recent advances with high-throughput methods in life-science research have increased the need for automatized data analysis and visual exploration techniques. Sophisti...
Björn H. Junker, Christian Klukas, Falk Schre...
142
Voted
CODES
2007
IEEE
15 years 9 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...