Sciweavers

8658 search results - page 1531 / 1732
» Models of Command and Control
Sort
View
CAV
2000
Springer
97views Hardware» more  CAV 2000»
14 years 2 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
DATE
2010
IEEE
145views Hardware» more  DATE 2010»
14 years 2 months ago
Energy-efficient real-time task scheduling with temperature-dependent leakage
Abstract--Leakage power consumption contributes significantly to the overall power dissipation for systems that are manufactured in advanced deep sub-micron technology. Different f...
Chuan-Yue Yang, Jian-Jia Chen, Lothar Thiele, Tei-...
ITNG
2010
IEEE
14 years 2 months ago
QARI: Quality Aware Software Deployment for Wireless Sensor Networks
Abstract--If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; i...
Wouter Horré, Sam Michiels, Wouter Joosen, ...
CSFW
1999
IEEE
14 years 1 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
MOBICOM
1999
ACM
14 years 1 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
« Prev « First page 1531 / 1732 Last » Next »