Sciweavers

999 search results - page 164 / 200
» Experiences from the design of a ubiquitous computing system...
Sort
View
MOBIHOC
2008
ACM
14 years 7 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
VSTTE
2005
Springer
14 years 1 months ago
Model Checking: Back and Forth between Hardware and Software
The interplay back and forth between software model checking and hardware model checking has been fruitful for both. Originally intended for the analysis of concurrent software, mo...
Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, He...
EUROSYS
2007
ACM
14 years 5 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
SAC
2010
ACM
14 years 2 months ago
Adaptive internet services through performance and availability control
Cluster-based multi-tier systems provide a means for building scalable Internet services. Building adaptive Internet services that are able to apply appropriate system sizing and ...
Jean Arnaud, Sara Bouchenak
AVBPA
2001
Springer
115views Biometrics» more  AVBPA 2001»
14 years 13 days ago
Visual Categorization of Children and Adult Walking Styles
We present an approach for visual discrimination of children from adults in video using characteristic regularities present in their locomotion patterns. The framework employs comp...
James W. Davis