Sciweavers

15888 search results - page 2766 / 3178
» Supporting human-intensive systems
Sort
View
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 10 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
ISIPTA
2003
IEEE
111views Mathematics» more  ISIPTA 2003»
15 years 10 months ago
The DecideIT Decision Tool
The nature of much information available to decision makers is vague and imprecise, be it information for human managers in organisations or for process agents in a distributed co...
Mats Danielson, Love Ekenberg, Jim Johansson, Aron...
ISSRE
2003
IEEE
15 years 10 months ago
An Empirical Study on Testing and Fault Tolerance for Software Reliability Engineering
Software testing and software fault tolerance are two major techniques for developing reliable software systems, yet limited empirical data are available in the literature to eval...
Michael R. Lyu, Zubin Huang, Sam K. S. Sze, Xia Ca...
KBSE
2003
IEEE
15 years 10 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 10 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
« Prev « First page 2766 / 3178 Last » Next »