Sciweavers

101 search results - page 17 / 21
» On the Use of Formal Techniques for Analyzing Dependable Rea...
Sort
View
NETWORKING
2004
13 years 8 months ago
Power Adaptation Based Optimization for Energy Efficient Reliable Wireless Paths
We define a transmission power adaptation-based routing technique that finds optimal paths for minimum energy reliable data transfer in multi-hop wireless networks. This optimal ch...
Suman Banerjee, Archan Misra
JELIA
2010
Springer
13 years 5 months ago
Decomposition of Distributed Nonmonotonic Multi-Context Systems
Multi-Context Systems (MCS) are formalisms that enable the interlinkage of single knowledge bases, called contexts, via bridge rules. Recently, the evaluation of heterogeneous, no...
Seif El-Din Bairakdar, Minh Dao-Tran, Thomas Eiter...
AAAI
1994
13 years 8 months ago
Learning to Coordinate without Sharing Information
Researchers in the eld of Distributed Arti cial Intelligence (DAI) have been developing e cient mechanisms to coordinate the activities of multiple autonomous agents. The need for...
Sandip Sen, Mahendra Sekaran, John Hale
DIM
2005
ACM
13 years 9 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen