Sciweavers

452 search results - page 54 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
TITB
2010
111views Education» more  TITB 2010»
14 years 5 months ago
Using heterogeneous wireless sensor networks in a telemonitoring system for healthcare
Ambient intelligence has acquired great importance in recent years and requires the development of new innovative solutions. This paper presents a distributed telemonitoring system...
Juan M. Corchado, Javier Bajo, Dante I. Tapia, Aji...
PEWASUN
2007
ACM
15 years 11 days ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
ECRTS
2010
IEEE
15 years 1 days ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller
USS
2010
14 years 8 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ICLP
2005
Springer
15 years 4 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu