Sciweavers

1875 search results - page 311 / 375
» Automatic Network Protocol Analysis
Sort
View
SPAA
2003
ACM
14 years 2 months ago
Information gathering in adversarial systems: lines and cycles
In this paper we consider the problem of routing packets to a single destination in a dynamically changing network, where both the network and the packet injections are under adve...
Kishore Kothapalli, Christian Scheideler
JPDC
2007
209views more  JPDC 2007»
13 years 8 months ago
Application-aware integration of data collection and power management in wireless sensor networks
Sensors are typically deployed to gather data about the physical world and its artifacts for a variety of purposes that range from environment monitoring, control, to data analysi...
Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian
INFOCOM
2010
IEEE
13 years 7 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
VTC
2010
IEEE
174views Communications» more  VTC 2010»
13 years 7 months ago
Multiple-Relay Aided Distributed Turbo Coding Assisted Differential Unitary Space-Time Spreading for Asynchronous Cooperative Ne
—This paper proposes a cooperative space-time coding (STC) protocol, amalgamating the concepts of asynchronous cooperation, non-coherent detection as well as Distributed Turbo Co...
Shinya Sugiura, Soon Xin Ng, Lingkun Kong, Sheng C...
BIRTHDAY
2003
Springer
14 years 2 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...