Sciweavers

3751 search results - page 559 / 751
» Events in security protocols
Sort
View
40
Voted
ICPR
2006
IEEE
16 years 1 months ago
The Twin Towers Cluster in Torah Codes
In this paper we describe a Torah Code experiment which: ? Focuses on a famous contemporary event. ? Has a simple and explicit data collection. ? Has considerably simpler measurem...
Eliyahu Rips, Art Levitt
97
Voted
COMPSAC
2007
IEEE
15 years 7 months ago
An Instant Messaging Framework for Flexible Interaction with Rich Clients
Today, we are seeing an increasing number of software applications that users want to use anywhere, anytime. Such mobile applications often deliver their user interfaces (UIs) to ...
Matthias Book, Volker Gruhn
125
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Information Dissemination in Power-Constrained Wireless Networks
— Dissemination of common information through broadcasting is an integral part of wireless network operations such as query of interested events, resource discovery and code upda...
Rong Zheng
99
Voted
DATE
2005
IEEE
164views Hardware» more  DATE 2005»
15 years 6 months ago
Automated Synthesis of Assertion Monitors using Visual Specifications
Automated synthesis of monitors from high-level properties plays a significant role in assertion-based verification. We present here a methodology to synthesize assertion monitors...
Ambar A. Gadkari, S. Ramesh
68
Voted
LCN
2005
IEEE
15 years 6 months ago
Dynamic DiffServ Configuration Using COPS-PR
This paper presents a framework for managing dynamic Service Level Specification (SLS) in Differentiated Services (diffserv) networks. In the considered scenario, the configuratio...
André Beller, Edgard Jamhour, Manoel Camill...