Increased concern about bioterrorism and emerging diseases is driving the development of systems for early epidemic detection. These systems have different requirements than tradit...
David L. Buckeridge, Martin J. O'Connor, Haobo Xu,...
Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and th...
Craig Partridge, Alex C. Snoeren, W. Timothy Stray...
This paper discusses a methodology used on an industrial hardware development project to validate various cache-coherence protocol components. The idea is to use a high level model...
Jesse D. Bingham, John Erickson, Gaurav Singh, Fle...
A framework is described that can be used to build and test application-level software for wireless mobile computing. It emulates the physical mobility of wireless devices by usin...
—In the past, researchers have developed specialized programs to aid programmers in detecting concurrent programming errors such as deadlocks, livelocks, starvation, and data rac...