Sciweavers

10379 search results - page 1989 / 2076
» The Chaos of Software Development
Sort
View
CSFW
2008
IEEE
15 years 4 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
ETFA
2008
IEEE
15 years 4 months ago
Pinpointing interrupts in embedded real-time systems using context checksums
When trying to track down bugs using cyclic debugging, the ability to correctly reproduce executions is imperative. In sequential, deterministic, non-real-time software, this repr...
Daniel Sundmark, Henrik Thane
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
ICPPW
2008
IEEE
15 years 4 months ago
Energy Modeling of Processors in Wireless Sensor Networks Based on Petri Nets
Power minimization is a serious issue in wireless sensor networks to extend the lifetime and minimize costs. However, in order to gain an accurate understanding of issues regardin...
Ali Shareef, Yifeng Zhu
INFOCOM
2008
IEEE
15 years 4 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
« Prev « First page 1989 / 2076 Last » Next »