Most requirement documents were written in ambiguous natural languages which are less formal and imprecise. Without modeling the requirement documents, the knowledge of the requirement is hard to be kept in a way, whi...
详细信息
Due to the wide availability of IoT devices at affordable cost and the ease of use has increased IoT devices increased usage. Due to the enormous usage of the Internet of Things (IoT) devices, the security aspects rel...
详细信息
Ultrasonic detection and identification of flaws embedded in large-grained materials is often limited by the presence of high amplitude interfering echoes due to unresolvable grain boundaries. The Split Spectrum Proce...
详细信息
A multistage interference cancellation (MIC) technique with Rake diversity (MIC-Rake) for QPSK asynchronous direct sequence code division multiple access (DS/CDMA) system over frequency selective multipath Rayleigh fa...
详细信息
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of aspects does not lead to misbehavior. ...
详细信息
ISBN:
(纸本)9781605589589
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of aspects does not lead to misbehavior. The newly composed aspect typically has many, if not unrestricted, rights to read and modify attributes of the base system. AspectJ, amongst other AOP systems, suffers from this limitation, which makes the composition of independently developed aspects riskful. We have defined and prototyped a run-time policy enforcement model based on execution history to protect programs from untrusted aspects. The dynamic nature of the approach has the advantage that up to date run-time information allows more accurate decision making. We have built a prototype for AspectJ and illustrate its use in a realistic example. Our evaluation shows that practical use of such a solution is feasible and that run-time overhead can be limited. Copyright 2010 ACM.
Reasoning the sensor data is necessary in context-awareness of home network. For sensing data usually was sent by hex code, it can't directly reason with this data type. So we convert this sensor data into ontolog...
详细信息
Edge-Cloud-of-Things (ECoT) is a model that facilitates the communicating nodes with the necessary resources for the data transmissions. The data transmitted in ECoT is done through the nearby IoT devices over the net...
详细信息
Pre-bond testing of TSVs and die logic is a significant challenge and a potential roadblock for 3D integration. BIST solutions introduce considerable die area overhead. Oversized probe pads on TSVs to provide pre-bond...
详细信息
Multispectral satellite image classification is crucial in remote sensing and image analysis, serving various applications like water area extraction, urban region classification, and vegetation monitoring. Model-base...
详细信息
In this paper, we investigate the use of limited infrastructure, in the form of wires, for improving the energy efficiency of a wireless sensor network. We call such a sensor network - a wireless sensor network with a...
详细信息
In this paper, we investigate the use of limited infrastructure, in the form of wires, for improving the energy efficiency of a wireless sensor network. We call such a sensor network - a wireless sensor network with a limited infrastructural support - a hybrid sensor network. The wires act as short cuts to bring down the average hop count of the network, resulting in a reduced energy dissipation per node. Our results indicate that adding a few wires to a wireless sensor network can not only reduce the average energy expenditure per sensor node, but also the non-uniformity in the energy expenditure across the sensor nodes. Copyright 2005 ACM.
暂无评论