Sciweavers

2631 search results - page 488 / 527
» Software Development with Code Maps
Sort
View
ISW
2010
Springer
13 years 5 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
SECON
2010
IEEE
13 years 5 months ago
EcoExec: An Interactive Execution Framework for Ultra Compact Wireless Sensor Nodes
Abstract--EcoExec is a host-assisted interactive execution environment for wireless sensing systems. Users can interact with sensor nodes by viewing attributes and invoking functio...
Chih-Hsiang Hsueh, Yi-Hsuan Tu, Yen-Chiu Li, Pai H...
DCOSS
2011
Springer
12 years 7 months ago
Compiling business process models for sensor networks
—Wireless sensor networks are increasingly being used to improve business processes. The behavior of such a process is usually captured in models while its implementation is typi...
Alexandra Caracas, Alexander Bernauer
ICCAD
2008
IEEE
153views Hardware» more  ICCAD 2008»
14 years 4 months ago
SPM management using Markov chain based data access prediction
— Leveraging the power of scratchpad memories (SPMs) available in most embedded systems today is crucial to extract maximum performance from application programs. While regular a...
Taylan Yemliha, Shekhar Srikantaiah, Mahmut T. Kan...
MBEES
2008
13 years 9 months ago
Composition of Model-based Test Coverage Criteria
: In this paper, we discuss adjustable coverage criteria and their combinations in model-based testing. We formalize coverage criteria and specify test goals using OCL. Then, we pr...
Mario Friske, Bernd-Holger Schlingloff, Stephan We...