Sciweavers

3154 search results - page 531 / 631
» An annotation based approach to support design communication
Sort
View
AMW
2010
14 years 11 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Decentralizing Query Processing in Sensor Networks
Recent research has led to the advent of software systems capable of performing query processing in sensor networks. They perform query processing in a sensor network by construct...
Ross Rosemark, Wang-Chien Lee
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 3 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
WIOPT
2010
IEEE
14 years 8 months ago
Optimal revocations in ephemeral networks: A game-theoretic framework
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...
GLOBECOM
2008
IEEE
15 years 4 months ago
Near-Capacity Three-Stage Downlink Iteratively Decoded Generalized Layered Space-Time Coding with Low Complexity
Abstract— This paper presents a low complexity iteratively detected space-time transmission architecture based on Generalized Layered Space-Time (GLST) codes and IRregular Convol...
Lingkun Kong, Soon Xin Ng, Lajos Hanzo