Sciweavers

6293 search results - page 1181 / 1259
» Information Flow Testing
Sort
View
128
Voted
PERCOM
2009
ACM
15 years 9 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
126
Voted
OZCHI
2009
ACM
15 years 9 months ago
Doing things backwards: the OWL project
The OWL project is inspired by Arthur C. Clarke's Third Law of Technology Prediction: Any sufficiently advanced technology is indistinguishable from magic. It consists of a s...
Danielle Wilde, Kristina Andersen
106
Voted
PLDI
2009
ACM
15 years 9 months ago
Error propagation analysis for file systems
Unchecked errors are especially pernicious in operating system file management code. Transient or permanent hardware failures are inevitable, and error-management bugs at the fi...
Cindy Rubio-González, Haryadi S. Gunawi, Be...
129
Voted
SENSYS
2009
ACM
15 years 9 months ago
Achieving range-free localization beyond connectivity
Wireless sensor networks have been proposed for many location-dependent applications. In such applications, the requirement of low system cost prohibits many range-based methods f...
Ziguo Zhong, Tian He
129
Voted
VEE
2009
ACM
107views Virtualization» more  VEE 2009»
15 years 9 months ago
Architectural support for shadow memory in multiprocessors
Runtime monitoring support serves as a foundation for the important tasks of providing security, performing debugging, and improving performance of applications. Often runtime mon...
Vijay Nagarajan, Rajiv Gupta
« Prev « First page 1181 / 1259 Last » Next »