Sciweavers

1087 search results - page 148 / 218
» Achieving Distributed Control through Model Checking
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks
—IEEE 802.11-based mesh networks can yield a throughput distribution among nodes that is spatially biased, with traffic originating from nodes that directly communicate with the...
Vincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Ed...
ICC
2009
IEEE
178views Communications» more  ICC 2009»
13 years 7 months ago
Cross-Layer Design for Energy Conservation in Wireless Sensor Networks
Abstract-- Wireless sensor networks (WSNs) require energyef cient protocols to improve the network lifetime. In this work, we adopt a cross-layer strategy that considers routing an...
Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutab...
WPES
2003
ACM
14 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ECOOPW
2008
Springer
13 years 11 months ago
Equation-Based Object-Oriented Languages and Tools
EOOLT'2007 was the first edition of the ECOOP-EOOLT workshop. The workshop is intended to bring researchers associated with different equation-based object-oriented (EOO) mode...
Peter Fritzson, David Broman, François Cell...
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger