Sciweavers

2079 search results - page 273 / 416
» Quantifying Information Flow
Sort
View
GLOBECOM
2008
IEEE
13 years 10 months ago
Maximum-Lifetime Coding Subgraph for Multicast Traffic in Wireless Sensor Networks
It has been shown that network coding can lead to significant improvement in network capacity and reduction in power consumption for multicast traffic in wireless networks. In this...
Vahid Shah-Mansouri, Vincent W. S. Wong
CONCURRENCY
2010
114views more  CONCURRENCY 2010»
13 years 10 months ago
A step towards refining and translating B control annotations to Handel-C
Research augmenting B machines presented at B2007 has demonstrated how fragments of control flow expressed as annotations can be added to associated machine operations, and shown t...
Wilson Ifill, Steve A. Schneider
ENVSOFT
2010
161views more  ENVSOFT 2010»
13 years 10 months ago
Graphical user interface for rapid set-up of SHETRAN physically-based river catchment model
The SHETRAN physically-based distributed rainfall-runoff modelling system gives detailed simulations in time and space of water flow and sediment and solute transport in river cat...
Stephen J. Birkinshaw, Philip James, John Ewen
ENTCS
2006
90views more  ENTCS 2006»
13 years 10 months ago
A Framework for Engineering Interactions in Java-based Component Systems
This paper describes a Java-based framework for the development of componentbased software systems supporting the specification of the logic of component interactions as a first-c...
Antonio Natali, Enrico Oliva, Alessandro Ricci, Mi...
IJNSEC
2008
83views more  IJNSEC 2008»
13 years 10 months ago
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
In this paper we present a novel dynamic verification approach to protect the local host confidentiality from malicious Java mobile code. In our approach we use Bytecode Modificat...
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru ...