Sciweavers

1102 search results - page 136 / 221
» Generalizing Updates: From Models to Programs
Sort
View
SASN
2006
ACM
14 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
ACSAC
2010
IEEE
13 years 7 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
UML
2005
Springer
14 years 3 months ago
Composing Domain-Specific Languages for Wide-Scope Software Engineering Applications
Abstract. Domain-Specific Languages (DSL) offer many advantages over general languages, but their narrow scope makes them really effective only in very focused domains, for example...
Jacky Estublier, Germán Vega, Anca Daniela ...
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
14 years 2 months ago
Test scheduling for core-based systems
We present optimal solutions to the test scheduling problem for core-based systems. We show that test scheduling is equivalent to the m-processor open-shop scheduling problem and ...
Krishnendu Chakrabarty
FLAIRS
2007
14 years 11 days ago
Interpretive Reasoning with Hypothetical Cases
Reasoning with hypothetical cases helps decision-makers evaluate alternate hypotheses for deciding a case. The hypotheticals demonstrate the sensitivity of a hypothesis to apparen...
Kevin D. Ashley