Sciweavers

19130 search results - page 3375 / 3826
» Modelling multi-path problems
Sort
View
ESOP
2006
Springer
15 years 8 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
137
Voted
ESORICS
2006
Springer
15 years 8 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
EUC
2006
Springer
15 years 8 months ago
Efficent Algorithm of Energy Minimization for Heterogeneous Wireless Sensor Network
Abstract. Energy and delay are critical issues for wireless sensor networks since most sensors are equipped with non-rechargeable batteries that have limited lifetime. Due to the u...
Mei Kang Qiu, Chun Xue, Zili Shao, Qingfeng Zhuge,...
EUC
2006
Springer
15 years 8 months ago
Cross-Layer Duty Cycle Scheduling with Data Aggregation Routing in Wireless Sensor Networks
Abstract. Well-scheduled communications, in conjunction with the aggregation of data reduce the energy waste on idle listening and redundant transmissions. In addition, the adjusta...
Yean-Fu Wen, Frank Yeong-Sung Lin
EWCBR
2006
Springer
15 years 8 months ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild
« Prev « First page 3375 / 3826 Last » Next »