Sciweavers

SAC
2009
ACM
14 years 6 months ago
Flexible self-healing gradients
Self-healing gradients are distributed estimates of the distance from each device in a network to the nearest device designated as a source, and are used in many pervasive computi...
Jacob Beal
SAC
2009
ACM
14 years 6 months ago
A gradient oriented recombination scheme for evolution strategies
This paper proposes a novel recombination scheme for evolutionary algorithms, which can guide the new population generation towards the maximum increase of the objective function....
Haifeng Chen, Guofei Jiang
SAC
2009
ACM
14 years 6 months ago
Eliciting required characteristics for usable requirements engineering approaches
It has been reported that many software companies do not use existing requirements engineering approaches. This indicates that there is room and opportunity for improving the usab...
Kristina Winbladh, Hadar Ziv, Debra J. Richardson
SAC
2009
ACM
14 years 6 months ago
Reasoning about comprehensions with first-order SMT solvers
K. Rustan M. Leino, Rosemary Monahan
SAC
2009
ACM
14 years 6 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
SAC
2009
ACM
14 years 6 months ago
ERIKA and open-ZB: an implementation for real-time wireless networking
IEEE 802.15.4/ZigBee and TinyOS have been playing an important role in leveraging a new generation of large-scale networked embedded systems. However, based on previous experience...
Paolo Pagano, Mangesh Chitnis, Antonio Romano, Giu...
SAC
2009
ACM
14 years 6 months ago
Improving stream correlation attacks on anonymous networks
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Gavin O'Gorman, Stephen Blott
SAC
2009
ACM
14 years 6 months ago
NECTAR: a DTN routing protocol based on neighborhood contact history
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
Etienne C. R. de Oliveira, Célio V. N. de A...
SAC
2009
ACM
14 years 6 months ago
Network protocol interoperability testing based on contextual signatures and passive testing
This paper presents a methodology for interoperability testing based on contextual signatures and passive testing with invariants. The concept of contextual signature offers a fra...
Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli