Sciweavers

1782 search results - page 292 / 357
» Tool Support for Proof Engineering
Sort
View
SENSYS
2009
ACM
14 years 3 months ago
Run time assurance of application-level requirements in wireless sensor networks
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Jingyuan Li, Yafeng Wu, Krasimira Kapitanova, John...
ESORICS
2008
Springer
13 years 10 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
CORR
2010
Springer
182views Education» more  CORR 2010»
13 years 8 months ago
Fast Convergence of Natural Bargaining Dynamics in Exchange Networks
Bargaining networks model the behavior of a set of players who need to reach pairwise agreements for making profits. Nash bargaining solutions in this context correspond to soluti...
Yashodhan Kanoria, Mohsen Bayati, Christian Borgs,...
ESWS
2011
Springer
13 years 8 days ago
DataFinland - A Semantic Portal for Open and Linked Datasets
The number of open datasets available on the web is increasing rapidly with the rise of the Linked Open Data (LOD) cloud and various governmental efforts for releasing public data ...
Matias Frosterus, Eero Hyvönen, Joonas Laitio
SIGSOFT
2005
ACM
14 years 9 months ago
KenyaEclipse: learning to program in eclipse
A fundamental part of a Computer Science degree is learning to program. Rather than starting students on a full commercial language, we favour using a dedicated "teaching lan...
Robert Chatley, Thomas Timbul