Sciweavers

1612 search results - page 305 / 323
» About models of security protocols
Sort
View
AINA
2005
IEEE
14 years 2 months ago
Optimal Energy-Efficient Routing for Wireless Sensor Networks
The network lifetime for wireless sensor network plays an important role to survivability. Thus, we indicate the importance of routing protocol to network lifetime, and model the ...
Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Che...
DSN
2005
IEEE
14 years 2 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
AAAI
1994
13 years 9 months ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale
COMBINATORICS
2007
118views more  COMBINATORICS 2007»
13 years 8 months ago
On the Quantum Chromatic Number of a Graph
We investigate the notion of quantum chromatic number of a graph, which is the minimal number of colours necessary in a protocol in which two separated provers can convince a refe...
Peter J. Cameron, Ashley Montanaro, Michael W. New...
JCST
2000
124views more  JCST 2000»
13 years 8 months ago
Distributed and Cooperative Information Retrieval on the World Wide Web
: A mass of heterogeneous, distributed and dynamic information on the World Wide Web (the Web) has resulted in "information overload". It's an important and urgent r...
Jicheng Wang, Xiangyu Jin, Yang Xiaojiang, Fuyan Z...