Sciweavers

2838 search results - page 191 / 568
» Verifying Controlled Components
Sort
View
IJSN
2006
76views more  IJSN 2006»
13 years 10 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
INFOCOM
2010
IEEE
13 years 8 months ago
Optimal Control of Wireless Networks with Finite Buffers
This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achie...
Long Bao Le, Eytan Modiano, Ness B. Shroff
ICSE
2003
IEEE-ACM
14 years 11 months ago
Using Process Technology to Control and Coordinate Software Adaptation
We have developed an infrastructure for end-to-end run-time monitoring, behavior/performance analysis, and dynamic adaptation of distributed software. This infrastructure is prima...
Giuseppe Valetto, Gail E. Kaiser
RTSS
2009
IEEE
14 years 5 months ago
Real-Time Control of I/O COTS Peripherals for Embedded Systems
Real-time embedded systems are increasingly being built using commercial-off-the-shelf (COTS) components such as mass-produced peripherals and buses to reduce costs, timeto-market...
Stanley Bak, Emiliano Betti, Rodolfo Pellizzoni, M...
DATE
2008
IEEE
128views Hardware» more  DATE 2008»
14 years 5 months ago
Robust and Low Complexity Rate Control for Solar Powered Sensors
This paper is concerned with solar driven sensors deployed in an outdoor environment. We present feedback controllers which adapt parameters of the application such that a maximal...
Clemens Moser, Lothar Thiele, Davide Brunelli, Luc...