Sciweavers

7103 search results - page 974 / 1421
» Program Generation and Components
Sort
View
SRDS
2007
IEEE
15 years 11 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
CP
2007
Springer
15 years 11 months ago
Solving the Salinity Control Problem in a Potable Water System
Salinity is the relative concentration of salts in water. In a city of southern China, the local water supply company pumps water from a nearby river for potable use. During the wi...
Chiu Wo Choi, Jimmy Ho-Man Lee
IWMM
2007
Springer
130views Hardware» more  IWMM 2007»
15 years 11 months ago
Accordion arrays
In this work, we present accordion arrays, a straightforward and effective memory compression technique targeting Unicode-based character arrays. In many non-numeric Java programs...
Craig B. Zilles
CIBCB
2006
IEEE
15 years 11 months ago
Motif Evaluation by Leave-one-out Scoring
Abstract— We propose a new method for collecting information on regulatory elements found by any motif discovery program. We suggest that combining the results of n leave-oneout ...
Audrey Girouard, Noah W. Smith, Donna K. Slonim
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
15 years 11 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin