Sciweavers

4305 search results - page 584 / 861
» Analysing Protocol Implementations
Sort
View
RTCSA
2005
IEEE
15 years 10 months ago
Optimization of Hierarchically Scheduled Heterogeneous Embedded Systems
We present an approach to the analysis and optimization of heterogeneous distributed embedded systems for hard real-time applications. The systems are heterogeneous not only in te...
Traian Pop, Paul Pop, Petru Eles, Zebo Peng
SADFE
2005
IEEE
15 years 10 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
ATAL
2005
Springer
15 years 10 months ago
An integrated framework for adaptive reasoning about conversation patterns
We present an integrated approach for reasoning about and learning conversation patterns in multiagent communication. The approach is based on the assumption that information abou...
Michael Rovatsos, Felix A. Fischer, Gerhard Wei&sz...
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
EUC
2005
Springer
15 years 10 months ago
Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks
Clustering algorithm is an essential element to implement a hierarchical routing protocol, especially for a large-scale wireless sensor network. In this paper, we propose a new typ...
Ji Young Choi, Chung Gu Kang, Yong-Suk Kim, Kyeong...