Sciweavers

1615 search results - page 217 / 323
» Distributed Forward Checking
Sort
View
ICDCS
2008
IEEE
15 years 9 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICTAC
2005
Springer
15 years 8 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
168
Voted
RTAS
2003
IEEE
15 years 7 months ago
VEST: An Aspect-Based Composition Tool for Real-Time Systems
Building distributed embedded systems from scratch is not cost-effective. Instead, designing and building these systems by using domain specific components has promise. However, i...
John A. Stankovic, Ruiqing Zhu, Ram Poornalingam, ...
110
Voted
CONCUR
1999
Springer
15 years 6 months ago
From Synchrony to Asynchrony
Abstract. We present an in-depth discussion of the relationships between synchrony and asynchrony. Simple models of both paradigms are presented, and we state theorems which guaran...
Albert Benveniste, Benoît Caillaud, Paul Le ...
122
Voted
PKDD
1999
Springer
118views Data Mining» more  PKDD 1999»
15 years 6 months ago
Mining Possibilistic Set-Valued Rules by Generating Prime Disjunctions
We describe the problem of mining possibilistic set-valued rules in large relational tables containing categorical attributes taking a finite number of values. An example of such a...
Alexandr A. Savinov