Sciweavers

1006 search results - page 96 / 202
» Better control on recommender systems
Sort
View
ECRTS
2005
IEEE
14 years 1 months ago
A Robust Implicit Access Protocol for Real-Time Wireless Collaboration
Advances in wireless technology have brought us closer to extensive deployment of distributed real-time embedded systems connected through a wireless channel. The medium access co...
Tanya L. Crenshaw, Ajay Tirumala, Spencer Hoke, Ma...
DSN
2008
IEEE
14 years 2 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
NBIS
2007
Springer
14 years 2 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
WS
2004
ACM
14 years 1 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
SIGSOFT
2010
ACM
13 years 6 months ago
Speculative analysis: exploring future development states of software
Most software tools and environments help developers analyze the present and past development states of their software systems. Few approaches have investigated the potential cons...
Yuriy Brun, Reid Holmes, Michael D. Ernst, David N...