Sciweavers

1240 search results - page 219 / 248
» Improving Memory Management Security for C and C
Sort
View
CTW
2002
75views more  CTW 2002»
13 years 8 months ago
The Use of a Formalised Risk Model in NHS Information System Development
: Information Systems (IS) and technology are used extensively throughout the NHS, and the 1998 national information strategy, "Information for Health", sets out how the ...
M. A. Jeffcott, C. W. Johnson
IJWMC
2010
103views more  IJWMC 2010»
13 years 6 months ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
TMC
2010
137views more  TMC 2010»
13 years 3 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
PDP
2011
IEEE
13 years 12 days ago
Energy-Aware Task Allocation for Network-on-Chip Based Heterogeneous Multiprocessor Systems
—Energy-efficiency is becoming one of the most critical issues in embedded system design. In Network-on-Chip (NoC) based heterogeneous Multiprocessor Systems, the energy consump...
Jia Huang, Christian Buckl, Andreas Raabe, Alois K...
MOBISYS
2011
ACM
12 years 11 months ago
Opportunistic alignment of advertisement delivery with cellular basestation overloads
This paper is motivated by two observations: (1) cellular network operators are actively exploring advertisement delivery as a new means of revenue generation, and (2) cellular ba...
Ravi Kokku, Rajesh Mahindra, Sampath Rangarajan, H...