Sciweavers

2002 search results - page 25 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
COORDINATION
2004
Springer
14 years 2 months ago
Using Coordination Middleware for Location-Aware Computing: A Lime Case Study
Abstract. The decoupling between behavior and communication fostered by coordination becomes of paramount importance in mobile computing. In this scenario, however, coordination te...
Amy L. Murphy, Gian Pietro Picco
TVLSI
2010
13 years 3 months ago
Improving Multi-Level NAND Flash Memory Storage Reliability Using Concatenated BCH-TCM Coding
By storing more than one bit in each memory cell, multi-level per cell (MLC) NAND flash memories are dominating global flash memory market due to their appealing storage density ad...
Shu Li, Tong Zhang
SPLC
2007
13 years 10 months ago
Automating Mappings between Use Case Diagrams and Feature Models for Software Product Lines
Features have been widely used by the product line community to model variability. They represent the common and variable characteristics of the members of a product line. They ar...
Alexandre Bragança, Ricardo Jorge Machado
MOBICOM
1996
ACM
14 years 29 days ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek