Sciweavers

641 search results - page 116 / 129
» Effective Change Detection Using Sampling
Sort
View
ICCCN
2007
IEEE
14 years 26 days ago
Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
You-Chiun Wang, Wen-Chih Peng, Min-Hsien Chang, Yu...
COOPIS
2004
IEEE
14 years 22 days ago
TRAP/J: Transparent Generation of Adaptable Java Programs
This paper describes TRAP/J, a software tool that enables new adaptable behavior to be added to existing Java applications transparently (that is, without modifying the application...
Seyed Masoud Sadjadi, Philip K. McKinley, Betty H....
INFOSCALE
2007
ACM
13 years 10 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
SIGPLAN
2002
13 years 8 months ago
Embedding built-in tests in hot spots of an object-oriented framework
: Object-oriented frameworks require thorough testing as they are intended to be reused repeatedly in developing numerous applications. Moreover, whenever a framework is extended f...
Taewoong Jeon, Hyonwoo Seung, Sungyoung Lee
ET
2008
92views more  ET 2008»
13 years 8 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...