Sciweavers

410 search results - page 68 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ADHOC
2011
13 years 13 days ago
RadiaLE: A framework for designing and assessing link quality estimators in wireless sensor networks
—Stringent cost and energy constraints impose the use of low-cost and low-power radio transceivers in large-scale wireless sensor networks (WSNs). This fact, together with the ha...
Nouha Baccour, Anis Koubaa, Maissa Ben Jamâa...
ENVSOFT
2011
134views more  ENVSOFT 2011»
13 years 3 months ago
Modelling and simulation of a jet fan for controlled air flow in large enclosures
Jet fans are applied for control of air flow and support of pollutant dispersal in large enclosures. In The Netherlands, application is well known for car parks as part of the fir...
B. J. M. v. d. Giesen, S. H. A. Penders, M. G. L. ...
OOPSLA
2009
Springer
14 years 3 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
PAM
2010
Springer
14 years 3 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
VLDB
2009
ACM
147views Database» more  VLDB 2009»
14 years 9 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...