Sciweavers

2757 search results - page 432 / 552
» On separating systems
Sort
View
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 9 months ago
Towards Verifying Parametrised Hardware Libraries with Relative Placement Information
Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Steve McKeever, Wayne Luk, Arran Derbyshire
ICSM
2003
IEEE
15 years 9 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
INFOCOM
2003
IEEE
15 years 9 months ago
An Analytical Study of a Tradeoff Between Transmission Power and FEC for TCP Optimization in Wireless Networks
- It is well known that TCP has performance problems when wireless links are involved in the end-to-end connection. This is due to the high bit error rate characterizing wireless l...
Laura Galluccio, Giacomo Morabito, Sergio Palazzo
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
SAINT
2003
IEEE
15 years 9 months ago
Implementing Role-based Interactions for Internet Agents
Large-scale distributed environments, such as the Internet, achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In s...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli