Sciweavers

1902 search results - page 296 / 381
» Differential Dynamic Logics
Sort
View
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 5 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
WWW
2009
ACM
14 years 10 months ago
MASTH proxy: an extensible platform for web overload control
Many overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For ...
Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte
WWW
2004
ACM
14 years 10 months ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
VLSID
2001
IEEE
129views VLSI» more  VLSID 2001»
14 years 10 months ago
Design Of Provably Correct Storage Arrays
In this paper we describe a hardware design method for memory and register arrays that allows the application of formal equivalence checking for comparing a high-level register tr...
Rajiv V. Joshi, Wei Hwang, Andreas Kuehlmann
AINA
2007
IEEE
14 years 4 months ago
Pervasive Computing with Frugal Objects
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
Benoît Garbinato, Rachid Guerraoui, Jarle Hu...