Sciweavers

3750 search results - page 701 / 750
» Timed Automata Patterns
Sort
View
MOBIHOC
2003
ACM
14 years 8 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
EUROSYS
2007
ACM
14 years 5 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
EWSN
2010
Springer
14 years 5 months ago
Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming selfselected communities around shared sensory data ...
Nam Pham, Raghu K. Ganti, Yusuf S. Uddin, Suman Na...
ICCD
2007
IEEE
121views Hardware» more  ICCD 2007»
14 years 5 months ago
Fast power network analysis with multiple clock domains
This paper proposes an efficient analysis flow and an algorithm to identify the worst case noise for power networks with multiple clock domains. First, we apply the Laplace transf...
Wanping Zhang, Ling Zhang, Rui Shi, He Peng, Zhi Z...
SAC
2010
ACM
14 years 3 months ago
Adaptive fuzzy-valued service selection
Service composition concerns both integration of heterogeneous distributed applications and dynamic selection of services. QoS-aware selection enables a service requester with cer...
Davide Bacciu, Maria Grazia Buscemi, Lusine Mkrtch...