Sciweavers

2875 search results - page 561 / 575
» Using separation of concerns for embedded systems design
Sort
View
EUROSYS
2010
ACM
15 years 6 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
CCS
2008
ACM
14 years 11 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
WWW
2008
ACM
15 years 10 months ago
StYLiD: Social Information Sharing with Free Creation of Structured Linked Data
Information sharing can be effective with structured data. The Semantic Web is mainly aimed at structuring information by creating widely accepted ontologies. However, users have ...
Aman Shakya, Hideaki Takeda, Vilas Wuwongse
89
Voted
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
15 years 9 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
EDBT
2008
ACM
171views Database» more  EDBT 2008»
15 years 9 months ago
Replay-based approaches to revision processing in stream query engines
Data stream processing systems have become ubiquitous in academic and commercial sectors, with application areas that include financial services, network traffic analysis, battlef...
Anurag Maskey, Mitch Cherniack