Sciweavers

729 search results - page 39 / 146
» Communicating Evolving Algebras
Sort
View
CCS
2006
ACM
14 years 12 days ago
An intruder model for verifying liveness in security protocols
We present a process algebraic intruder model for verifying a class of liveness properties of security protocols. For this class, the proposed intruder model is proved to be equiv...
Jan Cederquist, Muhammad Torabi Dashti
FLAIRS
2007
13 years 11 months ago
Fuzzy Temporal Relations for Fault Management
In this paper we shall introduce an approach that forms a basis for temporal data mining. A relation algebra is applied for the purpose of representing simultaneously dependencies...
Hanna Bauerdick, Björn Gottfried
CORR
2007
Springer
115views Education» more  CORR 2007»
13 years 8 months ago
Random Linear Network Coding: A free cipher?
Abstract— We consider the level of information security provided by random linear network coding in network scenarios in which all nodes comply with the communication protocols y...
Luísa Lima, Muriel Médard, Joã...
MDM
2005
Springer
117views Communications» more  MDM 2005»
14 years 2 months ago
Tuning query performance in mobile sensor databases
In this paper we propose a query-driven approach for tuning the time/energy trade-off in sensor networks with mobile sensors. The tuning factors include re-positioning of mobile s...
Vladimir Zadorozhny, Divyasheel Sharma, Prashant K...
APLAS
2003
ACM
14 years 1 months ago
Observing Asymmetry and Mismatch
The chi calculus is studied in the framework incorporating two constructions widely useful in applications: asymmetric communication and mismatch condition. The barbed bisimilarity...
Xiaoju Dong, Yuxi Fu