Sciweavers

1777 search results - page 301 / 356
» Programming Cryptographic Protocols
Sort
View
IJSSOE
2010
153views more  IJSSOE 2010»
13 years 6 months ago
SLIM: Service Location and Invocation Middleware for Mobile Wireless Sensor and Actuator Networks
One of the main obstacles to the adoption of Wireless Sensor Networks (WSNs) outside the research community is the lack of high level mechanisms to easily program them. This probl...
Gianpaolo Cugola, Alessandro Margara
DIMVA
2011
13 years 6 days ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
HRI
2012
ACM
12 years 4 months ago
ROS and Rosbridge: roboticists out of the loop
The advent of ROS, the Robot Operating System, has finally made it possible to implement and use state-of-the-art navigation and manipulation algorithms on widely-available, inex...
Christopher Crick, Graylin Jay, Sarah Osentoski, O...
MOBIHOC
2008
ACM
14 years 8 months ago
Efficient binary schemes for training heterogeneous sensor and actor networks
Sensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users ? called actors ? with real-time information in...
Ferruccio Barsi, Alfredo Navarra, Maria Cristina P...
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
14 years 3 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...