Sciweavers

554 search results - page 88 / 111
» Abstraction of Communication Channels in Promela: A Case Stu...
Sort
View
135
Voted
LICS
2012
IEEE
13 years 2 months ago
Graph Logics with Rational Relations and the Generalized Intersection Problem
Abstract—We investigate some basic questions about the interaction of regular and rational relations on words. The primary motivation comes from the study of logics for querying ...
Pablo Barceló, Diego Figueira, Leonid Libki...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 13 days ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
126
Voted
CORR
2010
Springer
100views Education» more  CORR 2010»
14 years 11 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
100
Voted
ICC
2007
IEEE
184views Communications» more  ICC 2007»
15 years 6 months ago
Lifetime Improvement of Wireless Sensor Networks by Collaborative Beamforming and Cooperative Transmission
Abstract— Extending network lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributive nodes in wireless sensor ...
Zhu Han, Harold Vincent Poor
CBSE
2005
Springer
15 years 6 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton