Sciweavers

6110 search results - page 1111 / 1222
» Graceful Network Operations
Sort
View
ISCI
2010
146views more  ISCI 2010»
15 years 10 days ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
142
Voted
CDC
2010
IEEE
100views Control Systems» more  CDC 2010»
14 years 10 months ago
Impulsive systems triggered by superposed renewal processes
We consider impulsive systems with several reset maps triggered by independent renewal processes, i.e., the intervals between jumps associated with a given reset map are identicall...
Duarte Antunes, João Pedro Hespanha, Carlos...
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
14 years 10 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 10 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
CSCW
2011
ACM
14 years 10 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
« Prev « First page 1111 / 1222 Last » Next »