Sciweavers

4799 search results - page 894 / 960
» Model Based Requirements Engineering for Embedded Software
Sort
View
152
Voted
CCS
2005
ACM
15 years 8 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
SENSYS
2004
ACM
15 years 8 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
130
Voted
DGO
2007
168views Education» more  DGO 2007»
15 years 4 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...
117
Voted
ICCSA
2009
Springer
15 years 9 months ago
Designing Data Warehouses for Geographic OLAP Querying by Using MDA
Data aggregation in Geographic Information Systems (GIS) is a desirable feature, spatial data are integrated in OLAP engines for this purpose. However, the development and operatio...
Octavio Glorio, Juan Trujillo
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 9 months ago
Predicting reuse of end-user web macro scripts
Repositories of code written by end-user programmers are beginning to emerge, but when a piece of code is new or nobody has yet reused it, then current repositories provide users ...
Christopher Scaffidi, Christopher Bogart, Margaret...