Sciweavers

4305 search results - page 173 / 861
» Analysing Protocol Implementations
Sort
View
AUTOMATICA
2007
107views more  AUTOMATICA 2007»
13 years 9 months ago
Quadratic stabilization of linear networked control systems via simultaneous protocol and controller design
We develop necessary and sufficient conditions for quadratic stabilizability of linear networked control systems by dynamic output feedback and communication protocols. These cond...
Dragan B. Dacic, Dragan Nesic
JLP
2008
75views more  JLP 2008»
13 years 9 months ago
Automated verification of selected equivalences for security protocols
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. W...
Bruno Blanchet, Martín Abadi, Cédric...
FUIN
2007
104views more  FUIN 2007»
13 years 9 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
SEMWEB
2009
Springer
14 years 3 months ago
The OWLlink Protocol
A semantic application typically is a heterogenous system of interconnected components, most notably a reasoner. OWLlink is an implementation-neutral protocol for communication bet...
Thorsten Liebig, Marko Luther, Olaf Noppens
GLOBECOM
2008
IEEE
14 years 3 months ago
Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing
— There have been many time synchronization protocols proposed for sensor networks. However, the issues related with securing such protocols have not received adequate amount of ...
Yafei Yang, Yan Sun