Sciweavers

169 search results - page 28 / 34
» Tools for Understanding the Behavior of Telecommunication Sy...
Sort
View
151
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
184
Voted
HPCA
2002
IEEE
16 years 4 months ago
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach
Power dissipation has become one of the most critical factors for the continued development of both high-end and low-end computer systems. The successful design and evaluation of ...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Mary J...
127
Voted
EUROSYS
2009
ACM
16 years 23 days ago
Tralfamadore: unifying source code and execution experience
Program source is an intermediate representation of software; it lies between a developer’s intention and the hardware’s execution. Despite advances in languages and developme...
Geoffrey Lefebvre, Brendan Cully, Michael J. Feele...
111
Voted
MODELS
2007
Springer
15 years 9 months ago
Statechart Development Beyond WYSIWYG
Modeling systems based on semi-formal graphical formalisms, such as Statecharts, have become standard practice in the design of reactive embedded devices. Statecharts are often mor...
Steffen Prochnow, Reinhard von Hanxleden
170
Voted
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 3 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi