Sciweavers

91 search results - page 7 / 19
» Survivable key compromise in software update systems
Sort
View
USENIX
2000
14 years 11 months ago
Towards Availability Benchmarks: A Case Study of Software RAID Systems
Benchmarks have historically played a key role in guiding the progress of computer science systems research and development, but have traditionally neglected the areas of availabi...
Aaron B. Brown, David A. Patterson
PFE
2001
Springer
15 years 2 months ago
Introducing Product Lines in Small Embedded Systems
: How do you introduce product lines into a hardware dominated organization that has increasing software architecture awareness and products with extremely limited memory resources...
Christoph Stoermer, Markus Roeddiger
SEKE
2005
Springer
15 years 3 months ago
Service Identification and Packaging in Service Oriented Reengineering
With the adoption to Web service technologies, more and more existing non-service-oriented software systems turn to be legacy systems. They require a service-oriented reengineerin...
Zhuopeng Zhang, Ruimin Liu, Hongji Yang
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 4 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...
ARCS
2010
Springer
15 years 1 months ago
A Hierarchical Distributed Control for Power and Performances Optimization of Embedded Systems
Power and resource management are key goals for the success of modern battery-supplied multimedia devices. This kind of devices are usually based on SoCs with a wide range of subsy...
Patrick Bellasi, William Fornaciari, David Siorpae...