Sciweavers

356 search results - page 30 / 72
» A computational approach to negative priming
Sort
View
DEBS
2007
ACM
13 years 11 months ago
Prefix forwarding for publish/subscribe
We present a prefix forwarding algorithm for content-based publish/subscribe systems. Our algorithm performs only one content-based match per message regardless of the number of r...
Zbigniew Jerzak, Christof Fetzer
PERCOM
2006
ACM
14 years 7 months ago
Localized Sensor Area Coverage with Low Communication Overhead
We propose several localized sensor area coverage protocols, for arbitrary ratio of sensing and transmission radii. Sensors are assumed to be time synchronized, and active sensors...
Antoine Gallais, Jean Carle, David Simplot-Ryl, Iv...
ICSE
2009
IEEE-ACM
14 years 8 months ago
Learning operational requirements from goal models
Goal-oriented methods have increasingly been recognised as an effective means for eliciting, elaborating, analysing and specifying software requirements. A key activity in these a...
Alessandra Russo, Dalal Alrajeh, Jeff Kramer, Seba...
WS
2006
ACM
14 years 1 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
ISPA
2005
Springer
14 years 28 days ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...