Sciweavers

2214 search results - page 137 / 443
» Dynamic Protocol Recovery
Sort
View
96
Voted
WWW
2008
ACM
16 years 1 months ago
Gsp-exr: gsp protocol with an exclusive right for keyword auctions
We propose a keyword auction protocol called the Generalized Second Price with an Exclusive Right (GSP-ExR). In existing keyword auctions, the number of displayed advertisements i...
Yuko Sakurai, Atsushi Iwasaki, Yasumasa Saito, Mak...
ICSE
2008
IEEE-ACM
16 years 23 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
104
Voted
EWSN
2009
Springer
15 years 7 months ago
DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks
Ensuring that every sensor node has the same code version is challenging in dynamic, unreliable multi-hop sensor networks. When nodes have different code versions, the network may...
Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Seungweo...
97
Voted
IPPS
2009
IEEE
15 years 7 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
92
Voted
VTC
2007
IEEE
115views Communications» more  VTC 2007»
15 years 7 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler