Sciweavers

610 search results - page 67 / 122
» Predicate-Based Key Exchange
Sort
View
ICCSA
2009
Springer
14 years 3 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
ICAS
2009
IEEE
169views Robotics» more  ICAS 2009»
14 years 3 months ago
Ontonuts: Reusable Semantic Components for Multi-agent Systems
The volumes of data in information systems are growing drastically. The systems become increasingly complex in trying to handle heterogeneity of ubiquitous components, standards, ...
Sergiy Nikitin, Artem Katasonov, Vagan Y. Terziyan
RTCSA
2009
IEEE
14 years 3 months ago
PLL Based Time Synchronization in Wireless Sensor Networks
Abstract—Time synchronization is a key component in numerous wireless sensor network applications. Most of the current software based time synchronization approaches suffer from ...
Gang Zhou, Sachin Shetty, George Simms, Min Song
IDC
2009
Springer
14 years 3 months ago
A Trusted Defeasible Reasoning Service for Brokering Agents in the Semantic Web
Abstract. Based on the plethora of proposals and standards for logic- and rulebased reasoning for the Semantic Web (SW), a key factor for the success of SW agents is interoperabili...
Kalliopi Kravari, Efstratios Kontopoulos, Nick Bas...
CSSE
2008
IEEE
14 years 3 months ago
Constructing a Fractal P2P Network
—A Peer-to-Peer (P2P) network is a communication network constructed on application level, for the purpose of exchanging information among peers. Fractal, defined as an object or...
Changxiong Tang, Rui Wang