Sciweavers

2112 search results - page 401 / 423
» Communication networks in geographically distributed softwar...
Sort
View
ISORC
2006
IEEE
15 years 3 months ago
RTSTREAM: Real-Time Query Processing for Data Streams
Many real-time applications, such as traffic control systems, surveillance systems and health monitoring systems, need to operate on continuous unbounded streams of data. These ap...
Yuan Wei, Sang Hyuk Son, John A. Stankovic
CCS
2004
ACM
15 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
ICFEM
2004
Springer
15 years 3 months ago
Linear Inequality LTL (iLTL): A Model Checker for Discrete Time Markov Chains
Abstract. We develop a way of analyzing the behavior of systems modeled using Discrete Time Markov Chains (DTMC). Specifically, we define iLTL, an LTL with linear inequalities on...
YoungMin Kwon, Gul Agha
CIA
2003
Springer
15 years 3 months ago
A Peer-to-Peer Approach to Resource Discovery in Multi-agent Systems
A multi-agent system is a network of software agents that cooperate to solve problems. In open multi-agent systems, the agents that need resources provided by other agents are not ...
Vassilios V. Dimakopoulos, Evaggelia Pitoura
COMCOM
2008
91views more  COMCOM 2008»
14 years 9 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia