Sciweavers

2632 search results - page 403 / 527
» Alternating Timed Automata
Sort
View
PODC
1994
ACM
15 years 5 months ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes
132
Voted
AINA
2009
IEEE
15 years 5 months ago
Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health Monitori
The use of wireless sensor networks (WSNs) for structural health monitoring is gaining popularity since it allows for a low-cost, rapid and robust assessment of structural integri...
Hwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan ...
DEBS
2007
ACM
15 years 5 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
DAC
2010
ACM
15 years 5 months ago
Reducing the number of lines in reversible circuits
Reversible logic became a promising alternative to traditional circuits because of its applications e.g. in low-power design and quantum computation. As a result, design of revers...
Robert Wille, Mathias Soeken, Rolf Drechsler
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 5 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson