Sciweavers

2236 search results - page 392 / 448
» Secure Software Design in Practice
Sort
View
COMCOM
2006
154views more  COMCOM 2006»
13 years 11 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
SAS
2010
Springer
159views Formal Methods» more  SAS 2010»
13 years 9 months ago
Automatic Abstraction for Intervals Using Boolean Formulae
c Abstraction for Intervals Using Boolean Formulae J¨org Brauer1 and Andy King2 1 Embedded Software Laboratory, RWTH Aachen University, Germany 2 Portcullis Computer Security, Pin...
Jörg Brauer, Andy King
SIGCOMM
2003
ACM
14 years 4 months ago
Scaling internet routers using optics
Routers built around a single-stage crossbar and a centralized scheduler do not scale, and (in practice) do not provide the throughput guarantees that network operators need to ma...
Isaac Keslassy, Shang-Tse Chuang, Kyoungsik Yu, Da...
SIGCSE
2000
ACM
132views Education» more  SIGCSE 2000»
14 years 3 months ago
Empirical investigation throughout the CS curriculum
Empirical skills are playing an increasingly important role in the computing profession and our society. But while traditional computer science curricula are effective in teaching...
David W. Reed, Craig S. Miller, Grant Braught
DAGSTUHL
1996
14 years 7 days ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...