- Full text PDF available (3)
The technology of sensor, pervasive computing, and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports, and are changing the way humans use computers. Existing… (More)
The nodes in Ad Hoc networks compete for channels when communicating, with the features of no center and self-organization. In traditional channel assignment strategy of MAC layer, nodes do not consider the demands to channel resources of other nodes, which hinders improving the network performance. Practically, in the network based on competitive MAC… (More)
Fatal security vulnerabilities are caused by undefined behaviors of C/C++ language used in Safety-Critical software design. Software static analysis is an important technique for identifying security vulnerabilities from software code and structure. The method of static analysis based on XML intermediate model is proposed in term of safety rules. The source… (More)
This paper analyses the features of embedded system programming curriculum and the practical significance of adopting research-teaching method, elaborates every link of the curriculum development, including classroom teaching, project-driven experimental teaching, and discusses the effect of implement of the research-teaching method at the end.
Taking C/C++ language for example, this article puts forward an innovative teaching mode according to the actual situation of programming course. The purpose of this article is to encourage students to take an active part in teaching, stimulate their learning enthusiasm and increase their programming opportunity, so that students' programming ability and… (More)
To reduce the redundant information in software static analysis and improve the accuracy and efficiency of the information extraction, this paper proposed a syntax trees model based on relational storage mode. Modeling on dependency relationship between terminals will effectively reduce the information redundancy and can be stored in XML (eXtensible Markup… (More)
It becomes a great challenge in the research area of meta-heuristics to predict the hardness of combinatorial optimization problem instances for a given algorithm. In this study, we focus on the hardness of the traveling salesman problem (TSP) for 2-opt. In the existing literature , two approaches are available to measure the hardness of TSP instances for… (More)