Sciweavers

950 search results - page 32 / 190
» Constraint Based Resilience Analysis
Sort
View
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 3 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
89
Voted
TACAS
1999
Springer
88views Algorithms» more  TACAS 1999»
15 years 1 months ago
A Theorem Prover-Based Analysis Tool for Object-Oriented Databases
We present a theorem-prover based analysis tool for object-oriented database systems with integrity constraints. Object-oriented database specifications are mapped to higher-order...
David Spelt, Susan Even
IJCNN
2000
IEEE
15 years 1 months ago
Using Hopfield Networks to Solve Traveling Salesman Problems Based on Stable State Analysis Technique
In our recent work, a general method called the stable state analysis technique was developed to determine constraints that the weights in the Hopfield energy function must satisf...
Gang Feng, Christos Douligeris
ICRA
2003
IEEE
147views Robotics» more  ICRA 2003»
15 years 2 months ago
Modular petri net based modeling, analysis and synthesis of dedicated production systems
−−−− Ordinary t-timed Petri Nets are used for modeling, analysis and synthesis of random topology production systems and networks. Each production system is first decompose...
George J. Tsinarakis, Kimon P. Valavanis, Nikos Ts...
93
Voted
CIC
2006
114views Communications» more  CIC 2006»
14 years 11 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu