Sciweavers

INFOCOM
2011
IEEE
13 years 2 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
13 years 5 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 11 months ago
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including terminat...
Elvira Albert, Miguel Gómez-Zamalloa, Laure...
CCR
2008
101views more  CCR 2008»
13 years 11 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
MKWI
2008
206views Business» more  MKWI 2008»
14 years 7 days ago
Service-Oriented Architecture: Introducing a Query Language
: Language offers human beings the ability to exchange information. Whether the information is understood or not depends on the structure, complexity and knowledge of the language....
Sebastian Günther, Claus Rautenstrauch, Niko ...
POPL
2000
ACM
14 years 2 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
WMCSA
2000
IEEE
14 years 3 months ago
Using history to improve mobile application adaptation
Prior work has shown the value of changing application fidelity to adapt to varying resource levels in a mobile environment. Choosing the right fidelity requires us to predict i...
Dushyanth Narayanan, Jason Flinn, Mahadev Satyanar...
COMPSAC
2000
IEEE
14 years 3 months ago
Effort-Index-Based Software Reliability Growth Models and Performance Assessment
In this paper, we first show that the logistic testing-effort function is practically acceptable/helpful for modeling software reliability growth and providing a reasonable descri...
Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu
SEM
2004
Springer
14 years 4 months ago
Extending Standard Java Runtime Systems for Resource Management
Resource management is a precondition to build reliable, extensible middleware and to host potentially untrusted user components. Resource accounting allows to charge users for the...
Walter Binder, Jarle Hulaas
CEAS
2004
Springer
14 years 4 months ago
Resisting SPAM Delivery by TCP Damping
Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to recei...
Kang Li, Calton Pu, Mustaque Ahamad