Sciweavers

2513 search results - page 428 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ISORC
2005
IEEE
14 years 3 months ago
Revisiting COTS middleware for DRE systems
Distributed Real-Time Embedded systems (DRE) increasingly rely on COTS middleware to meet their distribution needs. Yet, there is a technology gap between the design of COTS middl...
Jérôme Hugues, Laurent Pautet, Fabric...
ARCS
2005
Springer
14 years 3 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn
CCS
2005
ACM
14 years 3 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
ISSAC
2005
Springer
94views Mathematics» more  ISSAC 2005»
14 years 3 months ago
Domains and expressions: an interface between two approaches to computer algebra
This paper describes a method to use compiled, strongly typed Aldor domains in the interpreted, expression-oriented Maple environment. This represents a non-traditional approach t...
Cosmin E. Oancea, Stephen M. Watt
PERVASIVE
2005
Springer
14 years 3 months ago
Parasitic Mobility for Pervasive Sensor Networks
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Mathew Laibowitz, Joseph A. Paradiso