Sciweavers

1416 search results - page 182 / 284
» An Exact Interpretation of While
Sort
View
DSN
2008
IEEE
14 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ICASSP
2008
IEEE
14 years 4 months ago
Path-constrained partial music synchronization
Digital music collections often contain different versions and interpretations of a single musical work. In view of music retrieval and browsing applications, one important task, ...
Meinard Mueller, Daniel Appelt
SUTC
2008
IEEE
14 years 4 months ago
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks
Testing and verification methodologies for Wireless Sensor Networks (WSN) systems in pre-deployment are vital for a successful deployment. Increased visibility of the internal st...
Matthias Woehrle, Christian Plessl, Roman Lim, Jan...
APSEC
2007
IEEE
14 years 4 months ago
Towards Instant Automatic Model Refinement Based on OCL
Model refinement is a complex task. It is difficult for developers to refine models all by themselves. A good modeling tool should not only do routine refinement work for develope...
Hui Song, Yanchun Sun, Li Zhou, Gang Huang
ASWEC
2007
IEEE
14 years 4 months ago
Supporting OO Design Heuristics
Heuristics have long been recognised as a way to tackle problems which are intractable because of their size or complexity. They have been used in software engineering for purpose...
Neville Churcher, Sarah Frater, Cong Phuoc Huynh, ...