Critical network management applications increasingly demand fine-grained flow level measurements. However, current flow monitoring solutions are inadequate for many of these appl...
Vyas Sekar, Michael K. Reiter, Walter Willinger, H...
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
Distributed Real-Time (DRE) systems require the verification of their properties to ensure both reliability and conformance to initial requirements. Architecture description langu...
Ubiquitous physiological monitoring will be a key driving force in the upcoming wireless health revolution. Cardiac and brain signals in the form of ECG and EEG are two critical h...
Yu M. Chi, Patrick Ng, Eric Kang, Joseph Kang, Jen...
The paper introduces and formalizes a distributed approach for the model-based monitoring of the execution of a plan, where concurrent actions are carried on by a team of mobile r...