Sciweavers

2463 search results - page 468 / 493
» Embedded System Engineering Using C C Based Design Methodo...
Sort
View
CCS
2010
ACM
13 years 8 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
PPPJ
2009
ACM
14 years 2 days ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CSCW
2008
ACM
13 years 7 months ago
Context-linked virtual assistants for distributed teams: an astrophysics case study
There is a growing need for distributed teams to analyze complex and dynamic data streams and make critical decisions under time pressure. Via a case study, we discuss potential g...
Sarah S. Poon, Rollin C. Thomas, Cecilia R. Aragon...
MOBISYS
2010
ACM
13 years 9 months ago
ParkNet: drive-by sensing of road-side parking statistics
Urban street-parking availability statistics are challenging to obtain in real-time but would greatly benefit society by reducing traffic congestion. In this paper we present the ...
Suhas Mathur, Tong Jin, Nikhil Kasturirangan, Jana...