Sciweavers

3481 search results - page 559 / 697
» Exploration in Relational Worlds
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 9 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
ENGL
2008
130views more  ENGL 2008»
13 years 9 months ago
Design Factors on Dynamic Text Display
Electronic information display systems are widely used in public places. The increase in use of light-emitting diodes (LED) display arouses our interest in the effective methods of...
Joey C. Y. So, Alan H. S. Chan
ENTCS
2008
106views more  ENTCS 2008»
13 years 9 months ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
CN
2006
66views more  CN 2006»
13 years 9 months ago
Secure acknowledgment aggregation and multisignatures with limited robustness
In certain reliable group-oriented and multicast applications, a source needs to securely verify whether all (and if not all, which) intended receivers have received a message. How...
Claude Castelluccia, Stanislaw Jarecki, Jihye Kim,...
CORR
2006
Springer
116views Education» more  CORR 2006»
13 years 9 months ago
Memory Aware High-Level Synthesis for Embedded Systems
We introduce a new approach to take into account the memory architecture and the memory mapping in the High- Level Synthesis of Real-Time embedded systems. We formalize the memory...
Gwenolé Corre, Eric Senn, Nathalie Julien, ...