Sciweavers

1527 search results - page 201 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
SENSYS
2005
ACM
14 years 2 months ago
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a...
Jyh-How Huang, Saqib Amjad, Shivakant Mishra
JSAC
2008
167views more  JSAC 2008»
13 years 9 months ago
DTN: an architectural retrospective
We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a foc...
Kevin R. Fall, Stephen Farrell
SAINT
2008
IEEE
14 years 3 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal
AICT
2006
IEEE
210views Communications» more  AICT 2006»
14 years 3 months ago
Model-Based Analysis of Obligations in Web Service Choreography
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Howard Foster, Sebastián Uchitel, Jeff Mage...
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
14 years 2 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai