Sciweavers

1257 search results - page 249 / 252
» Open Source Requirements Engineering
Sort
View
SENSYS
2003
ACM
14 years 3 months ago
On the scaling laws of dense wireless sensor networks
We consider dense wireless sensor networks deployed to observe arbitrary random fields. The requirement is to reconstruct an estimate of the random field at a certain collector ...
Praveen Kumar Gopala, Hesham El Gamal
CCS
2003
ACM
14 years 3 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
SIGMOD
2000
ACM
158views Database» more  SIGMOD 2000»
14 years 2 months ago
NiagaraCQ: A Scalable Continuous Query System for Internet Databases
Continuous queries are persistent queries that allow users to receive new results when they become available. While continuous query systems can transform a passive web into an ac...
Jianjun Chen, David J. DeWitt, Feng Tian, Yuan Wan...
VLDB
1997
ACM
110views Database» more  VLDB 1997»
14 years 1 months ago
The Network as a Global Database: Challenges of Interoperability, Proactivity, Interactiveness, Legacy
The current integrated developments in network and computing give rise to a technical infrastructure for the information society which one may variously circumscribe by terms such...
Peter C. Lockemann, Ulrike Kölsch, Arne Kosch...
ACSAC
2001
IEEE
14 years 1 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon