Sciweavers

1040 search results - page 74 / 208
» Resource Usage Verification
Sort
View
IJISEC
2010
150views more  IJISEC 2010»
14 years 12 months ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...
148
Voted
POPL
2012
ACM
13 years 10 months ago
Higher-order functional reactive programming in bounded space
Functional reactive programming (FRP) is an elegant and successful approach to programming reactive systems declaratively. The high levels of abstraction and expressivity that mak...
Neelakantan R. Krishnaswami, Nick Benton, Jan Hoff...
146
Voted
WIDM
2012
ACM
13 years 10 months ago
Replaying history on process models for conformance checking and performance analysis
Process mining techniques use event data to discover process models, to check the conformance of predefined process models, and to extend such models with information about bottl...
Wil M. P. van der Aalst, Arya Adriansyah, Boudewij...
123
Voted
EDCC
2005
Springer
15 years 8 months ago
Fault Links: Exploring the Relationship Between Module and Fault Types
Fault links represent relationships between the types of mistakes made and the type of module being developed or modified. The existence of such fault links can be used to guide co...
Jane Huffman Hayes, Inies C. M. Raphael, Vinod Kum...
98
Voted
ICESS
2005
Springer
15 years 8 months ago
Semantic Web Based Knowledge Searching System in Mobile Environment
In this paper we propose semantic web-based mobile knowledge searching systems for display Web pages on mobile terminals. The proposed system reduces the time of verification when ...
Dae-Keun Si, Yang-Seung Jeon, Jong-Ok Choi, Young-...