Sciweavers

17298 search results - page 3155 / 3460
» Abstract computing machines
Sort
View
JSAC
2006
127views more  JSAC 2006»
15 years 4 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
JUCS
2006
108views more  JUCS 2006»
15 years 4 months ago
Defining Atomic Composition in UML Behavioral Diagrams
Abstract: UML may be used to describe both the structure and behavior of objectoriented systems using a combination of notations. For the modeling of the dynamic behavior, a number...
Júlio Henrique Araújo Pereira Machad...
JUCS
2006
107views more  JUCS 2006»
15 years 4 months ago
Testing Membership in Formal Languages Implicitly Represented by Boolean Functions
Abstract: Combinatorial property testing, initiated formally by Goldreich, Goldwasser, and Ron in [Goldreich et al. (1998)] and inspired by Rubinfeld and Sudan in [Rubinfeld and Su...
Beate Bollig
JUCS
2006
131views more  JUCS 2006»
15 years 4 months ago
Verification of CRWL Programs with Rewriting Logic
Abstract: We present a novel approach to the verification of functional-logic programs. For our verification purposes, equational reasoning is not valid due to the presence of non-...
José Miguel Cleva, Isabel Pita
JUCS
2006
114views more  JUCS 2006»
15 years 4 months ago
Pseudorandom Number Generation: Impossibility and Compromise
Abstract: Pseudorandom number generators are widely used in the area of simulation. Defective generators are still widely used in standard library programs, although better pseudor...
Makoto Matsumoto, Mutsuo Saito, Hiroshi Haramoto, ...
« Prev « First page 3155 / 3460 Last » Next »