Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Hussein M. Marah"'
Publikováno v:
ICSE (NIER)
Runtime monitoring is essential for ensuring the safe operation and enabling self-adaptive behavior of Cyber-Physical Systems (CPS). It requires the creation of system monitors, instrumentation for data collection, and the definition of constraints.
Publikováno v:
Annals of computer science and information systems
FedCSIS
FedCSIS
15th Federated Conference on Computer Science and Information Systems, FedCSIS 2020 -- 6 September 2020 through 9 September 2020 -- -- 164056
In this paper, we introduce a tool-supported reverse engineering methodology, called RE4TinyOS to creat
In this paper, we introduce a tool-supported reverse engineering methodology, called RE4TinyOS to creat
Publikováno v:
Journal of Computer Languages
Wireless Sensor Network (WSN) applications working on TinyOS operating system is widely used in various areas. However, the requirement of managing the power constraints makes TinyOS different from ordinary systems and hence building WSNs with TinyOS
Publikováno v:
International Conference on Computer Vision and Image Analysis Applications.
Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fr