Sciweavers

8689 search results - page 1679 / 1738
» Software: hard data
Sort
View
EWSN
2010
Springer
14 years 5 months ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 5 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
ICCD
2006
IEEE
97views Hardware» more  ICCD 2006»
14 years 5 months ago
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection
Pointer bugs associated with dynamically-allocated objects resulting in out-of-bounds memory access are an important class of software bugs. Because such bugs cannot be detected e...
Jin-Yi Wang, Yen-Shiang Shue, T. N. Vijaykumar, Sa...
SOSP
2005
ACM
14 years 5 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
BSN
2009
IEEE
171views Sensor Networks» more  BSN 2009»
14 years 3 months ago
DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications
We present an open-source platform for wireless body sensor networks called DexterNet. The system supports real-time, persistent human monitoring in both indoor and outdoor enviro...
Philip Kuryloski, Annarita Giani, Roberta Giannant...
« Prev « First page 1679 / 1738 Last » Next »