Sciweavers

357 search results - page 56 / 72
» Specifying and Verifying Fault-Tolerant Systems
Sort
View
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
14 years 1 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
CGO
2005
IEEE
14 years 1 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ICAS
2005
IEEE
88views Robotics» more  ICAS 2005»
14 years 1 months ago
A New Approach for the Construction of ALM Trees using Layered Coding
— This paper presents a novel approach for efficient tree construction in ALM (Application Layer Multicast) using layered video coding. This system is suitable for the users in h...
Yohei Okada, Masato Oguro, Jiro Katto, Sakae Okubo
DOCENG
2004
ACM
14 years 1 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
CDVE
2004
Springer
109views Visualization» more  CDVE 2004»
14 years 1 months ago
Interest Management for Collaborative Environments Through Dividing Their Shared State
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...
Michal Masa, Jiri Zara