Sciweavers

1040 search results - page 124 / 208
» Resource Usage Verification
Sort
View
120
Voted
ICSM
2005
IEEE
15 years 9 months ago
The Top Ten List: Dynamic Fault Prediction
To remain competitive in the fast paced world of software development, managers must optimize the usage of their limited resources to deliver quality products on time and within b...
Ahmed E. Hassan, Richard C. Holt
RTCSA
2005
IEEE
15 years 9 months ago
LyraNET: A Zero-Copy TCP/IP Protocol Stack for Embedded Operating Systems
Embedded systems are usually resource limited in terms of processing power, memory, and power consumption, thus embedded TCP/IP should be designed to make the best use of limited ...
Yun-Chen Li, Mei-Ling Chiang
SEFM
2005
IEEE
15 years 9 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
MSWIM
2005
ACM
15 years 9 months ago
Analysis of performance issues in an IP-based UMTS radio access network
The substitution of ATM transport by IP in future UMTS Radio Access Networks (UTRAN) introduces several performance challenges that need to be addressed to guarantee the feasibili...
Xavier Pérez Costa, Kjell Heinze, Albert Ba...
121
Voted
SENSYS
2005
ACM
15 years 9 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...