Sciweavers

801 search results - page 72 / 161
» Robust Software
Sort
View
ASWEC
2006
IEEE
14 years 4 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
CODES
2006
IEEE
14 years 4 months ago
A run-time, feedback-based energy estimation model For embedded devices
We present an adaptive, feedback-based, energy estimation model for battery-powered embedded devices such as sensor network gateways and hand-held computers. Our technique maps ha...
Selim Gurun, Chandra Krintz
ICSM
2005
IEEE
14 years 3 months ago
Dynamic Feature Traces: Finding Features in Unfamiliar Code
This paper introduces an automated technique for feature location: helping developers map features to relevant source code. Like several other automated feature location technique...
Andrew David Eisenberg, Kris De Volder
RE
2005
Springer
14 years 3 months ago
Identifying Contingency Requirements Using Obstacle Analysis
This paper describes the use of Obstacle Analysis to identify anomaly-handling requirements for a safetycritical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Stacy Nelson, Ann Patterson-Hine, C...
HPDC
2003
IEEE
14 years 3 months ago
The Ethernet Approach to Grid Computing
Despite many competitors, Ethernet became the dominant protocol for local area networking due to its simplicity, robustness, and efficiency in wide variety of conditions and tech...
Douglas Thain, Miron Livny