Sciweavers

1653 search results - page 211 / 331
» Timed analysis of security protocols
Sort
View
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 4 months ago
Cross-layer Design and Analysis of Wireless Profiled TCP for Vertical Handover
Abstract - In this paper, we consider downward and upward vertical handovers in integrated wireless LAN and cellular networks, and address Wireless Profiled TCP premature timeouts ...
Humphrey Rutagemwa, Sangheon Pack, Xuemin Shen, Jo...
JSS
2010
208views more  JSS 2010»
13 years 8 months ago
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks
This paper investigates a class of mobile wireless sensor networks that are unconnected most of the times; we refer to them as delay–tolerant wireless sensor networks (DTWSN). T...
Abbas Nayebi, Hamid Sarbazi-Azad, Gunnar Karlsson
ADHOC
2007
109views more  ADHOC 2007»
13 years 10 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
ACSAC
2010
IEEE
13 years 8 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...