Sciweavers

2038 search results - page 294 / 408
» Loops under Strategies
Sort
View
NDSS
2005
IEEE
15 years 10 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
QSHINE
2005
IEEE
15 years 10 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
TIME
2005
IEEE
15 years 10 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...
IUI
2005
ACM
15 years 10 months ago
Active preference learning for personalized calendar scheduling assistance
We present PLIANT, a learning system that supports adaptive assistance in an open calendaring system. PLIANT learns user preferences from the feedback that naturally occurs during...
Melinda T. Gervasio, Michael D. Moffitt, Martha E....
SAC
2005
ACM
15 years 10 months ago
Reflective middleware for wireless sensor networks
Wireless Sensor Networks (WSNs) are distributed systems whose main goal is to collect and deliver data to applications. This paper proposes a reflective, service-oriented middlewa...
Flávia Coimbra Delicato, Paulo F. Pires, Lu...