Sciweavers

1407 search results - page 235 / 282
» Using Use Cases in Executable Z
Sort
View
124
Voted
PRDC
2006
IEEE
15 years 9 months ago
Towards Timely ACID Transactions in DBMS
On-time data management is becoming a key difficulty faced by the information infrastructure of most organizations. In fact, database applications for critical areas are increasing...
Marco Vieira, António Casimiro Costa, Henri...
109
Voted
SENSYS
2006
ACM
15 years 9 months ago
Protothreads: simplifying event-driven programming of memory-constrained embedded systems
Event-driven programming is a popular model for writing programs for tiny embedded systems and sensor network nodes. While event-driven programming can keep the memory overhead do...
Adam Dunkels, Oliver Schmidt, Thiemo Voigt, Muneeb...
132
Voted
VEE
2006
ACM
116views Virtualization» more  VEE 2006»
15 years 9 months ago
Relative factors in performance analysis of Java virtual machines
Many new Java runtime optimizations report relatively small, single-digit performance improvements. On modern virtual and actual hardware, however, the performance impact of an op...
Dayong Gu, Clark Verbrugge, Etienne M. Gagnon
146
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Distributed Integrity Checking for Systems with Replicated Data
This work presents a new comparison-based diagnosis model and a new algorithm, called Hi-Dif, based on this model. The algorithm is used for checking the integrity of systems with...
Roverli Pereira Ziwich, Elias Procópio Duar...
141
Voted
ESAS
2005
Springer
15 years 9 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...