Sciweavers

7066 search results - page 1302 / 1414
» Contact Relations with Applications
Sort
View
ESOP
2005
Springer
14 years 3 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
EUC
2005
Springer
14 years 3 months ago
Coverage-Aware Sensor Engagement in Dense Sensor Networks
Wireless sensor networks are capable of carrying out surveillance missions for various applications in remote areas without human interventions. An essential issue of sensor netwo...
Jun Lu, Lichun Bao, Tatsuya Suda
ICA3PP
2005
Springer
14 years 3 months ago
GridMD: Program Architecture for Distributed Molecular Simulation
In the present work we describe architectural concepts of the distributed molecular simulation package GridMD. The main purpose of this work is to underline the construction patter...
Ilya Valuev
IFIP
2005
Springer
14 years 3 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
ISRR
2005
Springer
201views Robotics» more  ISRR 2005»
14 years 3 months ago
Advances in High Resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by the mismatch between available navigation as compared to sensor accuracy. In this paper we present ...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
« Prev « First page 1302 / 1414 Last » Next »