Sciweavers

1097 search results - page 210 / 220
» Sequential Object Monitors
Sort
View
LCN
2008
IEEE
14 years 4 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel
NDSS
2007
IEEE
14 years 4 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
CCECE
2006
IEEE
14 years 3 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
IAT
2006
IEEE
14 years 3 months ago
Engaging in a Conversation with Synthetic Agents along the Virtuality Continuum
Abstract During the last decade research groups as well as a number of commercial software developers have started to deploy embodied conversational characters in the user interfac...
Elisabeth André