Sciweavers

1490 search results - page 207 / 298
» Monitoring Mobile Code
Sort
View
IPPS
2005
IEEE
15 years 5 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
IPSN
2003
Springer
15 years 5 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
LCPC
2001
Springer
15 years 4 months ago
An Interface Model for Parallel Components
Component architectures promote cross-project code reuse by facilitating composition of large applications using off-the-shelf software components. Existing component architecture...
Milind A. Bhandarkar, Laxmikant V. Kalé
ECOOPW
1999
Springer
15 years 4 months ago
Aspects and Superimpositions
The model checking of applications of aspects is explained, by showing the stages and proof obligations when a collection of generic aspects (called a superimposition) is combined...
Shmuel Katz, Joseph Gil
IFIP
1994
Springer
15 years 4 months ago
Trends in Environmental Information Processing
In recent years, systems for processing environmental information have been evolving from research and development systems to practical applications. Today, many of these systems ...
Franz Josef Radermacher, Wolf-Fritz Riekert, Bernd...