Sciweavers

2111 search results - page 21 / 423
» How to Program Pervasive Systems
Sort
View
96
Voted
SIGSOFT
2006
ACM
16 years 1 months ago
Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation
Pervasive context-aware software is an emerging kind of application. Smart personal digital assistants and RFID-based location sensing software are two examples. Many of these sys...
Heng Lu, W. K. Chan, T. H. Tse
HVC
2007
Springer
153views Hardware» more  HVC 2007»
15 years 4 months ago
On the Architecture of System Verification Environments
Implementations of computer systems comprise many layers and employ a variety of programming languages. Building such systems requires support of an often complex, accompanying too...
Mark A. Hillebrand, Wolfgang J. Paul
WAC
2004
Springer
150views Communications» more  WAC 2004»
15 years 5 months ago
A Systems Architecture for Sensor Networks Based On Hardware/Software Co-design
We describe the motivation and design of a novel embedded systems architecture for large networks of small devices, tha canonical example being wireless sensor networks. The archit...
Andy Nisbet, Simon Dobson
CACM
2010
90views more  CACM 2010»
15 years 16 days ago
The Singularity system
Every operating system embodies a collection of design decisions. Many of the decisions behind systems have remained unchanged, even as hardware and software have evolved. Operati...
James R. Larus, Galen C. Hunt
145
Voted
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 10 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...