Sciweavers

54 search results - page 8 / 11
» el 2011
Sort
View
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 2 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
TR
2011
172views more  TR 2011»
13 years 2 months ago
Multi-State Reliability Systems Under Discrete Time Semi-Markovian Hypothesis
We consider repairable reliability systems with m components, the lifetimes and repair times of which are independent. The l-th component can be either in the failure state 0 or i...
Ourania Chryssaphinou, Nikolaos Limnios, Sonia Mal...
IEAAIE
2011
Springer
12 years 10 months ago
Model Checking Commitment Protocols
Using model checking to verify that interaction protocols have given properties is widely recognized as an important issue in multiagent systems where autonomous and heterogeneous ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 2 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
HCI
2011
12 years 10 months ago
Body Buddies: Social Signaling through Puppeteering
While virtual worlds have evolved to provide a good medium for social communication, they are very primitive in their social and affective communication design. The social communic...
Magy Seif El-Nasr, Katherine Isbister, Jeffery Ven...