Sciweavers

830 search results - page 159 / 166
» Owned Policies for Information Security
Sort
View
SECON
2008
IEEE
14 years 1 months ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
AGENTS
1998
Springer
13 years 11 months ago
Learning Situation-Dependent Costs: Improving Planning from Probabilistic Robot Execution
Physical domains are notoriously hard to model completely and correctly, especially to capture the dynamics of the environment. Moreover, since environments change, it is even mor...
Karen Zita Haigh, Manuela M. Veloso
OOPSLA
1997
Springer
13 years 11 months ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
DCOSS
2008
Springer
13 years 9 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
OOPSLA
2010
Springer
13 years 5 months ago
Ownership and immutability in generic Java
The Java language lacks the important notions of ownership (an object owns its representation to prevent unwanted aliasing) and immutability (the division into mutable, immutable,...
Yoav Zibin, Alex Potanin, Paley Li, Mahmood Ali, M...