Sciweavers

6110 search results - page 1111 / 1222
» Graceful Network Operations
Sort
View
ISCI
2010
146views more  ISCI 2010»
13 years 6 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
CDC
2010
IEEE
100views Control Systems» more  CDC 2010»
13 years 3 months ago
Impulsive systems triggered by superposed renewal processes
We consider impulsive systems with several reset maps triggered by independent renewal processes, i.e., the intervals between jumps associated with a given reset map are identicall...
Duarte Antunes, João Pedro Hespanha, Carlos...
CDC
2010
IEEE
144views Control Systems» more  CDC 2010»
13 years 3 months ago
Formal analysis of piecewise affine systems through formula-guided refinement
Abstract-- We present a computational framework for identifying a set of initial states from which all trajectories of a piecewise affine (PWA) system satisfy a Linear Temporal Log...
Boyan Yordanov, Jana Tumova, Calin Belta, Ivana Ce...
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
13 years 3 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
CSCW
2011
ACM
13 years 3 months ago
It's about time: confronting latency in the development of groupware systems
The presence of network latency leads to usability problems in distributed groupware applications. Example problems include difficulty synchronizing tightly-coupled collaboration...
Cheryl Savery, T. C. Nicholas Graham
« Prev « First page 1111 / 1222 Last » Next »