Sciweavers

2968 search results - page 234 / 594
» Network Programming Using PLAN
Sort
View
BIOCOMP
2006
15 years 4 months ago
The Use of Context-Sensitive Grammar For Modeling RNA Pseudoknots
- In this study, a context-sensitive grammar is suggested to model various forms of RNA secondary structures, especially pseudoknots. Comparing with a conventional context-free gra...
Keum-Young Sung
CASCON
2006
149views Education» more  CASCON 2006»
15 years 4 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
130
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Toward highly-available WSNs for assisted living
In response to the consistent increase of elder people living in their apartments, and the need for innovative non-obtrusive tools to connect elders to their caregivers, we starte...
Safwan Al-Omari, Weisong Shi
148
Voted
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 9 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong
USS
2008
15 years 5 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger