Sciweavers

394 search results - page 68 / 79
» Software Engineering for Future Healthcare and Clinical Syst...
Sort
View
CODES
2006
IEEE
14 years 1 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
MSS
2000
IEEE
72views Hardware» more  MSS 2000»
13 years 11 months ago
The InTENsity PowerWall: A Case Study for a Shared File System Testing Framework
The InTENsity PowerWall is a display system used for high-resolution visualization of very large volumetric data sets. The display is linked to two separate computing environments...
Alex W. Elder, Thomas Ruwart, Benjamin D. Allen, A...
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
14 years 27 days ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
IWCMC
2010
ACM
13 years 9 months ago
Emulation platform for network wide traffic sampling and monitoring
It is of utmost importance for the network research community to have access to tools and testbeds to explore future directions for Internet traffic monitoring and engineering. Al...
Amir Krifa, Imed Lassoued, Chadi Barakat
EUROSYS
2006
ACM
14 years 4 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...