Sciweavers

52 search results - page 7 / 11
» On the effectiveness of the metamorphic shield
Sort
View
ADAEUROPE
2007
Springer
14 years 27 days ago
Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks
The testing of programs in wireless sensor networks (WSN) is an important means to assure quality but is a challenging process. As pervasive computing has been identified as a not...
W. K. Chan, Tsong Yueh Chen, S. C. Cheung, T. H. T...
SECON
2007
IEEE
14 years 29 days ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
DAC
2002
ACM
14 years 7 months ago
Towards global routing with RLC crosstalk constraints
Conventional global routing minimizes total wire length and congestion. Experiments using large industrial benchmark circuits show that up to 24% of nets in such routing solutions...
James D. Z. Ma, Lei He
ADAEUROPE
2009
Springer
14 years 1 months ago
Weak Fairness Semantic Drawbacks in Java Multithreading
With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Claude Kaiser, Jean-François Pradat-Peyre
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
14 years 22 days ago
Design methodology for global resonant H-tree clock distribution networks
Abstract—Design guidelines for resonant H-tree clock distribution networks are presented in this paper. A distributed model of a two-level resonant H-tree structure is described,...
Jonathan Rosenfeld, Eby G. Friedman