Sciweavers

4350 search results - page 672 / 870
» Case studies for contract-based systems
Sort
View
ALGOSENSORS
2007
Springer
15 years 5 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
LWA
2008
15 years 5 months ago
Rule-Based Information Extraction for Structured Data Acquisition using TextMarker
Information extraction is concerned with the location of specific items in (unstructured) textual documents, e.g., being applied for the acquisition of structured data. Then, the ...
Martin Atzmüller, Peter Klügl, Frank Pup...
CASCON
2006
118views Education» more  CASCON 2006»
15 years 5 months ago
Ensuring behavioural equivalence in test-driven porting
In this paper we present a test-driven approach to porting code from one object-oriented language to another. We derive an order for the porting of the code, along with a testing ...
Mark Hennessy, James F. Power
FAST
2003
15 years 5 months ago
Modeling Hard-Disk Power Consumption
Excessive power consumption is a major barrier to the market acceptance of hard disks in mobile electronic devices. Studying and reducing power consumption, however, often involve...
John Zedlewski, Sumeet Sobti, Nitin Garg, Fengzhou...
129
Voted
USS
2004
15 years 5 months ago
On User Choice in Graphical Password Schemes
Graphical password schemes have been proposed as an alternative to text passwords in applications that support graphics and mouse or stylus entry. In this paper we detail what is,...
Darren Davis, Fabian Monrose, Michael K. Reiter