Sciweavers

2607 search results - page 499 / 522
» On the Architecture of System Verification Environments
Sort
View
137
Voted
OSDI
1996
ACM
15 years 3 months ago
Microkernels Meet Recursive Virtual Machines
This paper describes a novel approach to providingmodular and extensible operating system functionality and encapsulated environments based on a synthesis of microkernel and virtu...
Bryan Ford, Mike Hibler, Jay Lepreau, Patrick Tull...
MOBICOM
2010
ACM
15 years 2 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
146
Voted
PERCOM
2008
ACM
15 years 1 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
104
Voted
INFSOF
2007
126views more  INFSOF 2007»
15 years 1 months ago
Software maintenance seen as a knowledge management issue
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Nicolas Anquetil, Káthia Marçal de O...
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...