Sciweavers

6833 search results - page 164 / 1367
» Some two-character sets
Sort
View
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
15 years 11 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
WS
2005
ACM
15 years 10 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
SEMWEB
2005
Springer
15 years 10 months ago
Ontology Design Patterns for Semantic Web Content
The paper presents a framework for introducing design patterns that facilitate or improve the techniques used during ontology lifecycle. Some distinctions are drawn between kinds o...
Aldo Gangemi
SAC
2003
ACM
15 years 9 months ago
Basic Components for Constraint Solver Cooperations
We propose a predefined set of basic components for designing and implementing constraint solver cooperations and solver cooperation languages. Combining these components into pa...
Eric Monfroy, Carlos Castro
IDA
2003
Springer
15 years 9 months ago
Guided Incremental Construction of Belief Networks
Because uncertain reasoning is often intractable, it is hard to reason with a large amount of knowledge. One solution to this problem is to specify a set of possible models, some s...
Charles A. Sutton, Brendan Burns, Clayton T. Morri...