Sciweavers

1285 search results - page 219 / 257
» Information systems revisited - the general continuous case
Sort
View
WISEC
2009
ACM
15 years 8 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 1 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
125
Voted
IROS
2008
IEEE
137views Robotics» more  IROS 2008»
15 years 8 months ago
Universal web interfaces for robot control frameworks
— Developers and end-users have to interface robotic systems for control and feedback. Such systems are typically co-engineered with their graphical user interfaces. In the past,...
Jan Koch, Max Reichardt, Karsten Berns
RE
1997
Springer
15 years 6 months ago
Requirements Models in Context
The field of requirements engineering emerges out of tradition of research and engineering practice that stresses rtance of generalizations and abstractions. abstraction is essent...
Colin Potts
ICTAC
2009
Springer
14 years 11 months ago
Integration Testing from Structured First-Order Specifications via Deduction Modulo
Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large s...
Delphine Longuet, Marc Aiguier