Sciweavers

598 search results - page 99 / 120
» Procedure Based Program Compression
Sort
View
IFIP
2007
Springer
14 years 1 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
GLOBECOM
2006
IEEE
14 years 1 months ago
Multi-Stage Investment Decision under Contingent Demand for Networking Planning
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...
ADBIS
2006
Springer
100views Database» more  ADBIS 2006»
14 years 1 months ago
Novel Analysis Patterns in the Context of the Managed Investments Instruments
Abstract. Traditionally, the investment funds market exploits analysis and design concepts based on the procedural programming approach. We propose a set of analysis patterns which...
Luigi Ubezio, Claudia Raibulet, Antonio Carpinato
EGC
2005
Springer
14 years 1 months ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
DFG
2004
Springer
14 years 1 months ago
Executable HybridUML and Its Application to Train Control Systems
Abstract. In this paper, the authors introduce an extension of UML for the purpose of hybrid systems modeling. The construction uses the profile mechanism of UML 2.0 which is the ...
Kirsten Berkenkötter, Stefan Bisanz, Ulrich H...