Sciweavers

SCP
2010
163views more  SCP 2010»
13 years 6 months ago
Compact and efficient strings for Java
In several Java VMs, strings consist of two separate objects: metadata such as the string length are stored in the actual string object, while the string characters are stored in ...
Christian Häubl, Christian Wimmer, Hanspeter ...
SCP
2010
174views more  SCP 2010»
13 years 6 months ago
Aspects of availability: Enforcing timed properties to prevent denial of service
We propose a domain-specific aspect language to prevent denial of service caused by resource management. Our aspects specify availability policies by enforcing time limits in the ...
Pascal Fradet, Stéphane Hong Tuan Ha
SCP
2010
189views more  SCP 2010»
13 years 6 months ago
Distributed and Collaborative Software Evolution Analysis with Churrasco
Analyzing the evolution of large and long-lived software systems is a complex problem that requires extensive tool support due to the amount and complexity of the data that needs ...
Marco D'Ambros, Michele Lanza
SCN
2010
Springer
120views Communications» more  SCN 2010»
13 years 6 months ago
Identity crisis: on the problem of namespace design for ID-PKC and MANETs
In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 6 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
NGC
2010
Springer
183views Communications» more  NGC 2010»
13 years 6 months ago
Brain-like Computing Based on Distributed Representations and Neurodynamics
A key to overcoming the limitations of classical artificial intelligence and to deal well with enormous amounts of information might be brain-like computing in which distributed re...
Ken Yamane, Masahiko Morita
MOBILIGHT
2010
13 years 6 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
MBEC
2010
122views Communications» more  MBEC 2010»
13 years 6 months ago
Real-time estimation of cerebrospinal fluid system parameters via oscillating pressure infusion
Abstract Hydrocephalus is related to a disturbed cerebrospinal fluid (CSF) system. For diagnosis, lumbar infusion test are performed to estimate outflow conductance, Cout, and pres...
Kennet Andersson, Ian R. Manchester, Jan Malm, And...