Sciweavers

1123 search results - page 52 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
PERVASIVE
2008
Springer
14 years 11 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
15 years 5 months ago
Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks
Abstract— The wireless sensor network is an emerging technology that may greatly facilitate human life by providing ubiquitous sensing, computing, and communication capability. H...
Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, Wen-Tsuen ...
ISADS
2003
IEEE
15 years 5 months ago
The Central Guardian Approach to Enforce Fault Isolation in the Time-Triggered Architecture
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
Günther Bauer, Hermann Kopetz, Wilfried Stein...
CCS
2007
ACM
15 years 6 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
CMSB
2006
Springer
15 years 3 months ago
Compositional Reachability Analysis of Genetic Networks
Genetic regulatory networks have been modeled as discrete transition systems by many approaches, benefiting from a large number of formal verification algorithms available for the ...
Gregor Gößler