Sciweavers

5101 search results - page 821 / 1021
» Capturing Context Requirements
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
13 years 8 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ENTCS
2006
144views more  ENTCS 2006»
13 years 8 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
GRID
2006
Springer
13 years 8 months ago
How are Real Grids Used? The Analysis of Four Grid Traces and Its Implications
The Grid computing vision promises to provide the needed platform for a new and more demanding range of applications. For this promise to become true, a number of hurdles, includin...
Alexandru Iosup, Catalin Dumitrescu, Dick H. J. Ep...
CN
2007
90views more  CN 2007»
13 years 8 months ago
Distributed on-demand routing for LEO satellite systems
Notwithstanding the limited commercial success of the first narrowband Low Earth Orbit (LEO) satellite systems, the interest of the scientific community in this type of systems ...
Evangelos Papapetrou, Stylianos Karapantazis, Foti...
IJDSN
2006
109views more  IJDSN 2006»
13 years 8 months ago
Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks
Reliable dissemination of bulk data is one of the important problems in sensor networks. For example, programming or upgrading the software in sensors at run-time requires reliabl...
Sandeep S. Kulkarni, Mahesh Arumugam