Sciweavers

2272 search results - page 295 / 455
» Validity Invariants and Effects
Sort
View
CSMR
2009
IEEE
15 years 8 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
DATE
2009
IEEE
122views Hardware» more  DATE 2009»
15 years 8 months ago
A MILP-based approach to path sensitization of embedded software
—We propose a new methodology based on Mixed Integer Linear Programming (MILP) for determining the input values that will exercise a specified execution path in a program. In or...
José C. Costa, José C. Monteiro
EMS
2009
IEEE
15 years 8 months ago
Accurate Timeliness Simulations for Real-Time Wireless Sensor Networks
—The use of wireless sensor networks is rapidly growing in various types of applications that benefit from spatially distributed data collection. Some of these applications, suc...
Jérôme Rousselot, Jean-Dominique Deco...
GLOBECOM
2009
IEEE
15 years 8 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
ISCC
2009
IEEE
136views Communications» more  ISCC 2009»
15 years 8 months ago
Design and evaluation of a BitTorrent proxy for energy saving
Recent studies indicate that the Internet-related energy consumption represents a significant, and increasing, part of the overall energy consumption of our society. The largest c...
Giuseppe Anastasi, Marco Conti, Ilaria Giannetti, ...