Sciweavers

96 search results - page 10 / 20
» se 2008
Sort
View
COMCOM
2006
100views more  COMCOM 2006»
14 years 9 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi
TII
2008
98views more  TII 2008»
14 years 9 months ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux
CAISE
2008
Springer
14 years 11 months ago
When Interaction Choices Trigger Business Evolutions
In the context of development methods, early collaborations between specialists (SE, HCI, business, usability experts . . . ) allows having a broader view of the development possib...
Guillaume Godet-Bar, Sophie Dupuy-Chessa, Dominiqu...
ASPLOS
2008
ACM
14 years 11 months ago
SoftSig: software-exposed hardware signatures for code analysis and optimization
Many code analysis techniques for optimization, debugging, or parallelization need to perform runtime disambiguation of sets of addresses. Such operations can be supported efficie...
James Tuck, Wonsun Ahn, Luis Ceze, Josep Torrellas
RE
2008
Springer
14 years 9 months ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens