Sciweavers

1785 search results - page 206 / 357
» Modeling Communication with Synchronized Environments
Sort
View
154
Voted
CSFW
2007
IEEE
15 years 10 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
ICC
2007
IEEE
175views Communications» more  ICC 2007»
15 years 10 months ago
Cooperative Diversity for Virtual MIMO System in Geometry-Based Stochastic Channel Model
—Cooperative diversity is effectively used to combat the correlated fading. In the existing papers on cooperative diversity, the fading channels are idealistically assumed to be ...
Hongtao Zhang, Geng-Sheng Kuo
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 10 months ago
Modeling Channel Occupancy Times for Voice Traffic in Cellular Networks
—Call holding times in telephony networks are commonly approximated by exponential distributions to facilitate traffic engineering. However, for traffic engineering of cellular n...
Emre A. Yavuz, Victor C. M. Leung
JAISE
2011
238views more  JAISE 2011»
14 years 10 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 10 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...