Sciweavers

2520 search results - page 432 / 504
» Model-checking behavioral programs
Sort
View
IUI
2006
ACM
14 years 4 months ago
Augmenting kitchen appliances with a shared context using knowledge about daily events
Networked appliances can simplify our lives, but interacting with them can be difficult in itself. KitchenSense is an early prototype of a networked kitchen full of sensors that u...
Chia-Hsun Jackie Lee, Leonardo Bonanni, José...
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
14 years 3 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 3 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
DSN
2005
IEEE
14 years 3 months ago
Effective Testing and Debugging Techniques for a Group Communication System
View-oriented group communication is an important and widely used building block for constructing highlyavailable fault-tolerant systems. Unfortunately, groupcommunication based s...
Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Kri...
APLAS
2005
ACM
14 years 3 months ago
Abstract Dependences for Alarm Diagnosis
Dependences for Alarm Diagnosis Xavier Rival ´Ecole Normale Sup´erieure 45, rue d’Ulm, 75230, Paris cedex 5, France We propose a framework for dependence analyses, adapted –a...
Xavier Rival