Sciweavers

209 search results - page 16 / 42
» A Focused, Context-Sensitive Approach to Monitoring
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 5 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
SENSYS
2010
ACM
13 years 5 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh
ANSS
2004
IEEE
13 years 11 months ago
Cache Simulation Based on Runtime Instrumentation for OpenMP Applications
To enable optimizations in memory access behavior of high performance applications, cache monitoring is a crucial process. Simulation of cache hardware is needed in order to allow...
Jie Tao, Josef Weidendorfer
TMA
2012
Springer
254views Management» more  TMA 2012»
12 years 3 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
SAFECOMP
1999
Springer
13 years 11 months ago
Formal Design of Distributed Control Systems with Lustre
During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...