Sciweavers

1626 search results - page 224 / 326
» Subtyping with Power Types
Sort
View
AINA
2005
IEEE
15 years 10 months ago
Nodes Localization through Data Fusion in Sensor Network
The Location of nodes in sensor network is an important problem with application in resource allocation, location sensitive browsing, and emergency communications. A key problem i...
Ren C. Luo, Ogst Chen, Liang Chao Tu
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICNP
2005
IEEE
15 years 10 months ago
On Static and Dynamic Partitioning Behavior of Large-Scale Networks
In this paper, we analyze the problem of network disconnection in the context of large-scale P2P networks and understand how both static and dynamic patterns of node failure affec...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
INFOVIS
2005
IEEE
15 years 10 months ago
An Interactive 3D Integration of Parallel Coordinates and Star Glyphs
Parallel Coordinates are a powerful method for visualizing multidimensional data, however, with large data sets they can become cluttered and difficult to read. On the other hand...
Elena Fanea, M. Sheelagh T. Carpendale, Tobias Ise...
VTS
2005
IEEE
95views Hardware» more  VTS 2005»
15 years 10 months ago
SRAM Retention Testing: Zero Incremental Time Integration with March Algorithms
Testing data retention faults (DRFs), particularly in integrated systems on chip comprised of very large number of various sizes and types of embedded SRAMs is challenging and typ...
Baosheng Wang, Yuejian Wu, Josh Yang, André...