Sciweavers

44 search results - page 5 / 9
» Reasoning about Secrecy for Active Networks
Sort
View
IKE
2007
13 years 9 months ago
Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining
- We present an application for analyzing temporal and spatial interaction in an Association Network environment based on integrating Global Positioning Systems (GPS) Data, RDF Met...
David Luper, Delroy Cameron, John Miller, Hamid R....
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 9 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
MMMACNS
2005
Springer
14 years 1 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
AAAI
1998
13 years 9 months ago
Qualitative Analysis of Distributed Physical Systems with Applications to Control Synthesis
Manyimportant physical phenomena,such as temperature distribution, air flow, and acoustic waves,are describedas continuous,distributed parameterfields. Analyzingandcontrolling the...
Christopher Bailey-Kellogg, Feng Zhao
TC
1998
13 years 7 months ago
A Primary-Backup Channel Approach to Dependable Real-Time Communication in Multihop Networks
—Many applications require communication services with guaranteed timeliness and fault tolerance at an acceptable level of overhead. We present a scheme for restoring real-time c...
Seungjae Han, Kang G. Shin