Database Reference
In-Depth Information
[13] Q. Cao, T. Abdelzaher, J. Stankovic, K. Whitehouse, and L. Luo.
Declarative tracepoints: A programmable and application indepen-
dent debugging system for wireless sensor networks. In In Proc. of
the 6th ACM Conference on Embedded Networked Sensor Systems
(SenSys) , pages 85-98, Raleigh, NC, November 2008.
[14] Y. Chen, O. Gnawali, M. Kazandjieva, P. Levis, and J. Regehr.
Surviving sensor network software faults. In In Proc. of the 22nd
ACM Symposium on Operating Systems Principles (SOSP'09) ,
pages 235-246, Big Sky, MT, October 2009.
[15] H. Cheng, X. Yan, J. Han, and P. S. Yu. Direct discriminative pat-
tern mining for effective classification. In Proceedings of the 2008
IEEE 24th International Conference on Data Engineering ,ICDE
'08, pages 169-178, Washington, DC, USA, 2008. IEEE Computer
Society.
[16] Y. Chevalier, L. Compagna, J. Cuellar, P. Drielsma, J. Mantovani,
S. odersheim, and L. Vigneron. A high level protocol specification
language for industrial securitysensitive protocols. In Proceedings
of Workshop on Specification and Automated Processing of Secu-
rity Requirements (SAPS) , pages 193-205, 2004.
[17] J. Condit, M. Harren, Z. Anderson, D. Gay, and G. C. Necula.
Dependent types for low-level programming. In InProc.ofthe
16th European Symp. on Programming (ESOP) , Braga, Portugal,
March 2007.
[18] N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr. E-
cient memory safety for tinyos. In In Proc. of the 5th ACM Conf.
on Embedded Networked Sensor Systems (SenSys) , pages 205-218,
Sydney, Australia, November 2007.
[19] T. L. Crenshaw, E. Gunter, C. L. Robinson, L. Sha, and P. R.
Kumar. The simplex reference model: Limiting fault-propagation
due to unreliable components in cyber-physical system architec-
tures. In Proceedings of the 28th IEEE International Real-Time
Systems Symposium , RTSS '07, pages 400-412, Washington, DC,
USA, 2007. IEEE Computer Society.
[20] T. L. Crenshaw, C. L. Robinson, H. Ding, P. R. Kumar, and L. Sha.
A pattern for adaptive behavior in safety-critical, real-time mid-
dleware. In IEEE RTSS , December 2006.
[21] T. Dasu and T. Johnson. Exploratory Data Mining and Data
Cleaning . John Wiley & Sons, 2003.
[22] R. Dickerson, J. Lu, J. Lu, and K. Whitehouse. Stream feeds: an
abstraction for the world wide sensor web. In Proceedings of the 1st
Search WWH ::




Custom Search