Sciweavers

2513 search results - page 428 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ISORC
2005
IEEE
15 years 10 months ago
Revisiting COTS middleware for DRE systems
Distributed Real-Time Embedded systems (DRE) increasingly rely on COTS middleware to meet their distribution needs. Yet, there is a technology gap between the design of COTS middl...
Jérôme Hugues, Laurent Pautet, Fabric...
ARCS
2005
Springer
15 years 10 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn
CCS
2005
ACM
15 years 10 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
ISSAC
2005
Springer
94views Mathematics» more  ISSAC 2005»
15 years 10 months ago
Domains and expressions: an interface between two approaches to computer algebra
This paper describes a method to use compiled, strongly typed Aldor domains in the interpreted, expression-oriented Maple environment. This represents a non-traditional approach t...
Cosmin E. Oancea, Stephen M. Watt
PERVASIVE
2005
Springer
15 years 10 months ago
Parasitic Mobility for Pervasive Sensor Networks
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Mathew Laibowitz, Joseph A. Paradiso