Sciweavers

598 search results - page 70 / 120
» Aspect-Oriented Development Using Protocol Modeling
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 4 months ago
Off-network Control for Scalable Routing in Very Large Sensor Networks
—This paper presents an architectural solution to address the problem of scalable routing in very large sensor networks. The control complexities of the existing sensor routing p...
Tao Wu, Subir K. Biswas
JDCTA
2010
172views more  JDCTA 2010»
13 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applying a Layered Policy Model to IP Based Voice Services
Traditionally, specific telecommunications services were essentially confined to certain types of networks; e.g., television over broadcast networks or cable and voice service ove...
Douglas C. Sicker
IJCAT
2010
87views more  IJCAT 2010»
13 years 8 months ago
Image-based measurement of alveoli volume expansion in an animal model of a diseased lung
Currently, there does not exist reliable MV treatment or protocols in critical care to treat acute respiratory diseases, and thus no proven way to optimise care to minimise the mor...
Christopher E. Hann, Darren Hewett, J. Geoffrey Ch...