Sciweavers

394 search results - page 63 / 79
» The wireless control network: Monitoring for malicious behav...
Sort
View
TITS
2008
101views more  TITS 2008»
13 years 8 months ago
Lane-Change Fuzzy Control in Autonomous Vehicles for the Overtaking Maneuver
Abstract--The automation of the overtaking maneuver is considered to be one of the toughest challenges in the development of autonomous vehicles. This operation involves two vehicl...
José Eugenio Naranjo, Carlos Gonzále...
GI
2003
Springer
14 years 1 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
DSN
2002
IEEE
14 years 1 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
P2P
2003
IEEE
130views Communications» more  P2P 2003»
14 years 1 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
CONEXT
2006
ACM
14 years 2 months ago
SNARE: sensor node attached reputation evaluator
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
Ismat K. Maarouf, A. R. Naseer