Sciweavers

9842 search results - page 389 / 1969
» Compositional timing analysis
Sort
View
IEEEARES
2007
IEEE
15 years 11 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
IFM
2007
Springer
104views Formal Methods» more  IFM 2007»
15 years 11 months ago
Probabilistic Timed Behavior Trees
The Behavior Tree notation has been developed as a method for systematically and traceably capturing user requirements. In this paper we extend the notation with probabilistic beha...
Robert Colvin, Lars Grunske, Kirsten Winter
IV
2005
IEEE
183views Visualization» more  IV 2005»
15 years 10 months ago
3D Information Visualization for Time Dependent Data on Maps
The visual analysis of time dependent data is an essential task in many application fields. However, visualizing large time dependent data collected within a spatial context is st...
Christian Tominski, Petra Schulze-Wollgast, Heidru...
WS
2005
ACM
15 years 10 months ago
Secure time synchronization service for sensor networks
In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attack...
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, ...
HYBRID
2005
Springer
15 years 10 months ago
Non-uniqueness in Reverse Time of Hybrid System Trajectories
Under standard Lipschitz conditions, trajectories of systems described by ordinary differential equations are well defined in both forward and reverse time. (The flow map is inv...
Ian A. Hiskens