Sciweavers

2133 search results - page 363 / 427
» Implementation of a SystemC based Environment
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 10 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
CORR
2006
Springer
103views Education» more  CORR 2006»
13 years 10 months ago
VXA: A Virtual Architecture for Durable Compressed Archives
Data compression algorithms change frequently, and obsolete decoders do not always run on new hardware and operating systems, threatening the long-term usability of content archiv...
Bryan Ford
CN
2007
141views more  CN 2007»
13 years 10 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CONCURRENCY
2007
100views more  CONCURRENCY 2007»
13 years 10 months ago
An instrumentation technique for online analysis of multithreaded programs
Runtime verification of multithreaded systems, that is, the process of finding errors in multithreaded systems as they execute, is the theme of this paper. The major goal of the...
Grigore Rosu, Koushik Sen
JSW
2008
130views more  JSW 2008»
13 years 10 months ago
A Constraint-Driven Executable Model of Dynamic System Reconfiguration
Dynamic system reconfiguration techniques are presented that can enable the systematic evolution of software systems due to unanticipated changes in specification or requirements. ...
D'Arcy Walsh, Francis Bordeleau, Bran Selic