Sciweavers

2703 search results - page 474 / 541
» Learning operational requirements from goal models
Sort
View
ISCI
2010
146views more  ISCI 2010»
13 years 7 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
TIP
2010
151views more  TIP 2010»
13 years 4 months ago
Camera Scheduling and Energy Allocation for Lifetime Maximization in User-Centric Visual Sensor Networks
We explore camera scheduling and energy allocation strategies for lifetime optimization in image sensor networks. For the application scenarios that we consider, visual coverage ov...
Chao Yu, Gaurav Sharma
HPCA
2011
IEEE
13 years 1 months ago
Calvin: Deterministic or not? Free will to choose
Most shared memory systems maximize performance by unpredictably resolving memory races. Unpredictable memory races can lead to nondeterminism in parallel programs, which can suff...
Derek Hower, Polina Dudnik, Mark D. Hill, David A....
INFOCOM
2011
IEEE
13 years 1 months ago
Connectivity maintenance in mobile wireless networks via constrained mobility
—We explore distributed mechanisms for maintaining the physical layer connectivity of a mobile wireless network while still permitting significant area coverage. Moreover, we re...
Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zu...
RECOMB
2007
Springer
14 years 10 months ago
Reconstructing the Topology of Protein Complexes
Abstract. Recent advances in high-throughput experimental techniques have enabled the production of a wealth of protein interaction data, rich in both quantity and variety. While t...
Allister Bernard, David S. Vaughn, Alexander J. Ha...