Sciweavers

1528 search results - page 44 / 306
» On Signatures for Communication Graphs
Sort
View
AMC
2005
145views more  AMC 2005»
13 years 7 months ago
Connectivity graphs as models of local interactions
In this paper, we study graphs that arise from certain sensory and communication limitations on the local interactions in multi-agent systems. In particular, we show that the set ...
Abubakr Muhammad, Magnus Egerstedt
ICICS
2007
Springer
14 years 1 months ago
Application of the PageRank Algorithm to Alarm Graphs
James J. Treinen, Ramakrishna Thurimella
ISCC
2006
IEEE
14 years 1 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
INFOCOM
1998
IEEE
13 years 12 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
ENTCS
2006
117views more  ENTCS 2006»
13 years 7 months ago
Distributed Graph Traversals by Relabelling Systems with Applications
Graph traversals are in the basis of many distributed algorithms. In this paper, we use graph relabelling systems to encode two basic graph traversals which are the broadcast and ...
Bilel Derbel, Mohamed Mosbah