Sciweavers

5056 search results - page 306 / 1012
» Network Coding Theory
Sort
View
CCS
2010
ACM
15 years 4 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
SMC
2007
IEEE
122views Control Systems» more  SMC 2007»
15 years 10 months ago
Can complexity science support the engineering of critical network infrastructures?
— Considerable attention is now being devoted to the study of “complexity science” with the intent of discovering and applying universal laws of highly interconnected and evo...
David Alderson, John C. Doyle
CIA
2007
Springer
15 years 10 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 8 months ago
A mechanism design approach to the stabilization of networked dynamical systems
— In this paper we study the problem of stabilizing a networked control system (NCS) composed of N linear dynamical subplants and an equal number of controllers acting over a sha...
Luca Galbusera, Nicola Gatti, Carlo Romani
BIS
2011
342views Business» more  BIS 2011»
14 years 3 months ago
A Concept of the Knowledge Strategic Resource Network (SknowNet) for SMEs
This paper presents concept of the strategic knowledge resource network for SMEs. A strategic-knowledge resource in a company represents the knowledge, skills and capabilities of t...
Justyna Patalas-Maliszewska, Irene Krebs