Sciweavers

3638 search results - page 30 / 728
» Distribution chain security
Sort
View
PIMRC
2008
IEEE
14 years 2 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
ICDCS
2003
IEEE
14 years 1 months ago
Monitoring and Characterization of Component-Based Systems with Global Causality Capture
Current software development techniques and tools lack the capability to characterize function call chains in multithreaded and distributed applications built upon component techn...
Jun Li
EUSFLAT
2009
212views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
An Interval Type-2 Fuzzy Distribution Network
Abstract-- Planning resources for a supply chain is a major factor determining its success or failure. In this paper we introduce an Interval Type-2 Fuzzy Logic model of a distribu...
Simon Miller, Viara Popova, Robert John, Mario A. ...
ECRTS
2010
IEEE
13 years 8 months ago
The Demand Bound Function Interface of Distributed Sporadic Pipelines of Tasks Scheduled by EDF
—In distributed real-time embedded systems (DRE), it is common to model an application as a set of task chains. Each chain is activated cyclically and must complete before an end...
Nicola Serreli, Giuseppe Lipari, Enrico Bini
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
13 years 11 months ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...