Sciweavers

2111 search results - page 285 / 423
» How to Program Pervasive Systems
Sort
View
MOBISEC
2009
Springer
14 years 4 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
CDC
2008
IEEE
111views Control Systems» more  CDC 2008»
14 years 4 months ago
Computing correlated equilibria of polynomial games via adaptive discretization
— We construct a family of iterative discretization algorithms for computing sequences of finitely-supported correlated equilibria of n-player games with polynomial utility func...
Noah D. Stein, Asuman E. Ozdaglar, Pablo A. Parril...
IWNAS
2008
IEEE
14 years 4 months ago
Software Barrier Performance on Dual Quad-Core Opterons
Multi-core processors based SMP servers have become building blocks for Linux clusters in recent years because they can deliver better performance for multi-threaded programs thro...
Jie Chen, William A. Watson III
ECRTS
2006
IEEE
14 years 3 months ago
Optimal On-Line Scheduling of Multiple Control Tasks: A Case Study
We study the problem of dynamically scheduling a set of state-feedback control tasks controlling a set of linear plants. We consider an on-line non-preemptive scheduling policy th...
Anton Cervin, Peter Alriksson
ICSM
2006
IEEE
14 years 3 months ago
Teaching Evolution of Open-Source Projects in Software Engineering Courses
In the traditional software engineering courses, the students develop small programs from scratch. This does not correspond to industry practice where programmers spend most of th...
Joseph Buchta, Maksym Petrenko, Denys Poshyvanyk, ...