Sciweavers

111 search results - page 14 / 23
» Run-Time Verification of Networked Software
Sort
View
LCTRTS
2005
Springer
15 years 3 months ago
Efficient application migration under compiler guidance
Mobile computing based upon wireless technology as the interconnect and PDAs, Web-enabled cell phones etc. as the end devices provide a rich infrastructure for anywhere, anytime i...
Kun Zhang, Santosh Pande
ENTCS
2008
87views more  ENTCS 2008»
14 years 9 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
SIMUTOOLS
2008
14 years 11 months ago
Real-time emulation of networked robot systems
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
Razvan Beuran, Junya Nakata, Takashi Okada, Yasuo ...
INFOCOM
1999
IEEE
15 years 1 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
COMSIS
2007
135views more  COMSIS 2007»
14 years 9 months ago
Ambient Intelligence: Concepts and Applications
Ambient Intelligence aims to enhance the way people interact with their environment to promote safety and to enrich their lives. A Smart Home is one such system but the idea extend...
Juan Carlos Augusto, Paul J. McCullagh