Sciweavers

1022 search results - page 29 / 205
» Challenges for Constraint Programming in Networking
Sort
View
CCS
2009
ACM
15 years 4 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
99
Voted
IAAI
2001
15 years 1 months ago
Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach
ADIOP is an application for Automated Diagnosis of InterOperability Problems. Interoperability testing involves checking the degree of compatibility between two networking devices...
Mohammed H. Sqalli, Eugene C. Freuder
93
Voted
ESA
2003
Springer
98views Algorithms» more  ESA 2003»
15 years 5 months ago
Network Lifetime and Power Assignment in ad hoc Wireless Networks
In ad-hoc wireless networks, certain network connectivity constraints are of interest because of their practical importance. An example of such a constraint would be strong connec...
Gruia Calinescu, Sanjiv Kapoor, Alexander Olshevsk...
ATAL
2008
Springer
15 years 2 months ago
Coordination of first responders under communication and resource constraints
This paper discusses the application of distributed constraint optimization to coordination in disaster management situations under sub-optimal network conditions. It presents an ...
Robert N. Lass, Joseph B. Kopena, Evan Sultanik, D...
BROADNETS
2006
IEEE
15 years 4 months ago
Efficient Integration of Web Services in Ambient-aware Sensor Network Applications
Sensor webs are heterogeneous collections of sensor devices that collect information and interact with the environment. They consist of wireless sensor networks that are ensembles ...
Isaac Amundson, Manish Kushwaha, Xenofon D. Koutso...