Sciweavers

464 search results - page 39 / 93
» Teaching an engineering approach for network computing
Sort
View
IPSN
2009
Springer
15 years 6 months ago
Automating rendezvous and proxy selection in sensornets
As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We in...
David Chu, Joseph M. Hellerstein
ECIR
2003
Springer
15 years 1 months ago
Evaluating Peer-to-Peer Networking for Information Retrieval within the Context of Meta-searching
Peer-to-peer (P2P) computing has shown an unexpected growth and development during the recent years. P2P networking is being applied from B2B enterprise solutions to more simple, e...
Iraklis A. Klampanos, James J. Barnes, Joemon M. J...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CODES
2005
IEEE
15 years 5 months ago
Automatic network generation for system-on-chip communication design
With growing system complexities, system-level communication design is becoming increasingly important and advanced, network-oriented communication architectures become necessary....
Dongwan Shin, Andreas Gerstlauer, Rainer Döme...
CISIS
2009
IEEE
15 years 6 months ago
Integration of Shareable Containers with Distributed Hash Tables for Storage of Structured and Dynamic Data
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...
eva Kühn, Richard Mordinyi, Hannu-D. Goiss, T...