Sciweavers

925 search results - page 41 / 185
» Connectivity on Complete Lattices
Sort
View
CCS
2000
ACM
15 years 3 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
JSYML
2000
103views more  JSYML 2000»
14 years 11 months ago
A Model Complete Theory of Valued D-Fields
The notion of a D-ring, generalizing that of a differential or a difference ring, is introduced. Quantifier elimination and a version of the AxKochen-Ershov principle is proven for...
Thomas Scanlon
COMSWARE
2008
IEEE
15 years 6 months ago
Deterministic schemes for key distribution in wireless sensor networks
— In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel compl...
Abhishek Gupta, Joy Kuri
HUC
1999
Springer
15 years 4 months ago
The Role of Connectivity in Supporting Context-Sensitive Applications
This paper considers the role of network connectivity in supporting context-sensitive applications. A range of context-sensitive applications are analysed with respect to connectiv...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
SASO
2008
IEEE
15 years 6 months ago
Connectivity Service for Mobile Ad-Hoc Networks
Abstract—We present a distributed connectivity service that allows agents in a mobile ad-hoc network to move while preserving connectivity. This allows unmodified motion plannin...
Alejandro Cornejo, Nancy A. Lynch