Sciweavers

279 search results - page 43 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
HYBRID
1998
Springer
14 years 5 days ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
CCS
2008
ACM
13 years 10 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
TMC
2010
111views more  TMC 2010»
13 years 6 months ago
Interference Management and Rate Adaptation in OFDM-Based UWB Networks
—Ultra-wideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have ...
Raed T. Al-Zubi, Marwan Krunz
SPAA
2009
ACM
14 years 2 months ago
Distributed algorithms for QoS load balancing
We consider a dynamic load balancing scenario in which users allocate resources in a non-cooperative and selfish fashion. The perceived performance of a resource for a user decre...
Heiner Ackermann, Simon Fischer, Martin Hoefer, Ma...
MIDDLEWARE
2004
Springer
14 years 1 months ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes