Sciweavers

1239 search results - page 148 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks
—Increasingly many wireless sensor network deployments are using harvested environmental energy to extend system lifetime. Because the temporal profiles of such energy sources e...
Christopher M. Vigorito, Deepak Ganesan, Andrew G....
USS
2004
13 years 9 months ago
On Gray-Box Program Tracking for Anomaly Detection
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
SIGSOFT
2009
ACM
14 years 8 months ago
Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models
System specifications have long been expressed through automata-based languages, enabling verification techniques such as model checking. These verification techniques can assess ...
Esteban Pavese, Sebastián Uchitel, Ví...
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 2 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller