Sciweavers

39 search results - page 6 / 8
» Automatic analysis of distance bounding protocols
Sort
View
MICCAI
2005
Springer
14 years 7 months ago
Corpus Callosum Subdivision Based on a Probabilistic Model of Inter-hemispheric Connectivity
Statistical shape analysis has become of increasing interest to the neuroimaging community due to its potential to locate morphological changes. In this paper, we present the a nov...
Martin Andreas Styner, Ipek Oguz, Rachel Gimpel Sm...
FUIN
2008
72views more  FUIN 2008»
13 years 7 months ago
Working with the Past: Integrating History in Petri Nets
Abstract. Most information systems that are driven by process models (e.g., workflow management systems) record events in event logs, also known as transaction logs or audit trails...
Kees M. van Hee, Alexander Serebrenik, Natalia Sid...
PODC
2004
ACM
14 years 11 days ago
Gradient clock synchronization
We introduce the distributed gradient clock synchronization problem. As in traditional distributed clock synchronization, we consider a network of nodes equipped with hardware clo...
Rui Fan, Nancy A. Lynch
ICOIN
2005
Springer
14 years 14 days ago
On the Hidden Terminal Problem in Multi-rate Ad Hoc Wireless Networks
Multi-hop ad hoc wireless networks generally use the IEEE 802.11 Distributed Coordination Function (DCF) MAC protocol, which utilizes the request-to-send/clear-to-send (RTS/CTS) me...
Joon Yoo, Chongkwon Kim
EUROSYS
2007
ACM
14 years 4 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...