Sciweavers

2849 search results - page 47 / 570
» As We Should Have Thought
Sort
View
TIFS
2008
149views more  TIFS 2008»
13 years 9 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
AINA
2006
IEEE
14 years 3 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
CSEE
2007
Springer
14 years 1 months ago
Exploiting Multiplicity to Teach Reliability and Maintainability in a Capstone Project
Many, if not most, Computer Science programs contain some form of capstone, or senior, project as a key requirement in receiving a bachelor's degree in Computer Science or So...
Janet E. Burge
ISI
2006
Springer
13 years 9 months ago
Personal Information Management (PIM) for Intelligence Analysis
The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are rele...
Antonio Badia
ANLP
1994
101views more  ANLP 1994»
13 years 11 months ago
Sublanguage Engineering In The Fog System
FoG currently produces bilingual marine and public weather forecasts at several Canadian weather offices. The system is engineered to reflect "good professional style" a...
Richard I. Kittredge, Eli Goldberg, Myunghee Kim, ...