Sciweavers

2702 search results - page 299 / 541
» Message from the Editor
Sort
View
CSFW
2007
IEEE
15 years 10 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
IEEESCC
2007
IEEE
15 years 10 months ago
Governance of Cross-Organizational Service Agreements: A Policy-Based Approach
Many real-life organizations are hierarchies of largely autonomous, heterogeneous members (individuals or other organizations), often exhibiting rich policies. We restrict our att...
Yathiraj B. Udupi, Munindar P. Singh
INFOCOM
2007
IEEE
15 years 10 months ago
How Optimal are Wireless Scheduling Protocols?
— In wireless networks mutual interference impairs the quality of received signals and might even prevent the correct reception of messages. It is therefore of paramount importan...
Thomas Moscibroda, Yvonne Anne Oswald, Roger Watte...
INFOCOM
2007
IEEE
15 years 10 months ago
A Localization-Based Anti-Sensor Network System
—In this paper, an anti-sensor network system is proposed, aiming to protect an important area from being under surveillance by an adversary’s sensor nodes. The major component...
Zhimin Yang, Eylem Ekici, Dong Xuan
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
Renita Machado, Sirin Tekinay