Sciweavers

1358 search results - page 128 / 272
» Diverse Firewall Design
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
Distributed cooperative processing and control over wireless sensor networks
An overview of some recent advances in distributed information processing for control over wireless sensor networks is presented in this paper. Firstly, a taxonomy of fundamental ...
Carlo Fischione, Karl Henrik Johansson, Fabio Graz...
SIGCSE
2006
ACM
172views Education» more  SIGCSE 2006»
15 years 10 months ago
Computing in context: integrating an embedded computing project into a course on ethical and societal issues
A hands-on embedded computing project is introduced into an undergraduate social sciences course. In the pilot module, nine student teams created working prototypes, using the tec...
Fred G. Martin, Sarah Kuhn
117
Voted
ICSM
2005
IEEE
15 years 10 months ago
Incremental Maintenance of Software Artifacts
We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Steven P. Reiss
ESORICS
2005
Springer
15 years 10 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
FMCO
2005
Springer
173views Formal Methods» more  FMCO 2005»
15 years 10 months ago
Cluster-Based LTL Model Checking of Large Systems
Abstract. In recent years a bundle of parallel and distributed algorithms for verification of finite state systems has appeared. We survey distributed-memory enumerative LTL mode...
Jiri Barnat, Lubos Brim, Ivana Cerná