Sciweavers

605 search results - page 40 / 121
» A strategy for efficiently verifying requirements
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Autonomous Localization Method in Wireless Sensor Networks
In wireless sensor networks, localization systems use data from sensors which receive signals from moving targets, measure RSSI, and translate RSSI into the distance between senso...
Yoshikazu Ohta, Masashi Sugano, Masayuki Murata
EUROCRYPT
2009
Springer
14 years 9 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
INFOCOM
1999
IEEE
14 years 1 months ago
Cell Identification Codes for Tracking Mobile Users
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by ...
Zohar Naor, Hanoch Levy
GLOBECOM
2010
IEEE
13 years 6 months ago
On Comparing the Performance of Dynamic Multi-Network Optimizations
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networ...
Geert Jan Hoekstra, Robert D. van der Mei, J. W. B...
MICCAI
2007
Springer
14 years 10 months ago
Interactive Contacts Resolution Using Smooth Surface Representation
Accurately describing interactions between medical devices and anatomical structures, or between anatomical structures themselves, is an essential step towards the adoption of comp...
Jérémie Dequidt, Julien Lenoir, Step...