Sciweavers

161 search results - page 13 / 33
» Towards a Theory of Anonymous Networking
Sort
View
IJDMB
2008
105views more  IJDMB 2008»
13 years 7 months ago
Temporal representation for gene networks: towards a qualitative temporal data mining
: Recently lots of studies aim at modeling and inferring gene networks. Modeling tools propose graphical models having almost nothing about time description of events and regards t...
Nicolas Turenne, Sylviane R. Schwer
CSFW
2000
IEEE
13 years 11 months ago
Towards Automatic Verification of Authentication Protocols on an Unbounded Network
Schneider's work on rank functions [14] provides a formal approach to verification of certain properties of a security protocol. However, he illustrates the approach only wit...
James Heather, Steve Schneider
ICDCSW
2008
IEEE
14 years 2 months ago
Secure Control: Towards Survivable Cyber-Physical Systems
In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
CAV
2009
Springer
156views Hardware» more  CAV 2009»
14 years 2 months ago
Towards Performance Prediction of Compositional Models in Industrial GALS Designs
Systems and Networks on Chips (NoCs) are a prime design focus of many hardware manufacturers. In addition to functional verification, which is a difficult necessity, the chip desi...
Nicolas Coste, Holger Hermanns, Etienne Lantreibec...
PODC
2010
ACM
13 years 11 months ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...