Sciweavers

2940 search results - page 384 / 588
» Behavioral Constraints for Services
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
EUROMICRO
2009
IEEE
14 years 4 months ago
An Architecture-Based Framework for Managing Adaptive Real-Time Applications
—Real-time systems are increasingly used in dynamic changing environments with variable user needs, hosting real-time applications ranging in number and nature. This paper propos...
Ning Gui, Vincenzo De Florio, Hong Sun, Chris Blon...
ISORC
2009
IEEE
14 years 4 months ago
Marte CCSL to Execute East-ADL Timing Requirements
In the automotive domain, several loosely-coupled Architecture Description Languages (ADLs) compete to proet of abstract modeling and analysis services on top of the implementatio...
Frédéric Mallet, Marie-Agnès ...
ANSS
2008
IEEE
14 years 4 months ago
A Primer for Real-Time Simulation of Large-Scale Networks
—Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network...
Jason Liu
CISIS
2008
IEEE
14 years 4 months ago
The Grid4All Ontology for the Retrieval of Traded Resources in a Market-Oriented Grid
One of the most challenging problems in Grid environments concerns the matchmaking between resource requests and offers. As it happens in the physical economy, Grid economy must b...
Konstantinos Kotis, George A. Vouros, Alexandros G...