Sciweavers

322 search results - page 44 / 65
» Modelling and Reasoning Languages for Social Networks Polici...
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
CASCON
1996
113views Education» more  CASCON 1996»
13 years 8 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 7 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
IFIP
1997
Springer
13 years 11 months ago
Measurement-based CAC for video applications using SBR service
This paper provides a conservative estimation of the required bandwidth for video sources multiplexed according to the bu erless scheme and using the Statistical Bit Rate transfer...
F. Brichet, Alan Simonian
ICML
2004
IEEE
14 years 8 months ago
Learning associative Markov networks
Markov networks are extensively used to model complex sequential, spatial, and relational interactions in fields as diverse as image processing, natural language analysis, and bio...
Benjamin Taskar, Vassil Chatalbashev, Daphne Kolle...