Sciweavers

1980 search results - page 173 / 396
» On the Associative Nijenhuis Relation
Sort
View
CSFW
2007
IEEE
15 years 7 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
DEXAW
2007
IEEE
92views Database» more  DEXAW 2007»
15 years 7 months ago
Mapping of heterogeneous schemata, business structures, and terminologies
The current effort to extend the power of information systems by making use of the semantics associated with terms and structures has resulted in a need to establish correspondenc...
Domenico Beneventano, Sabina El Haoum, Daniele Mon...
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 7 months ago
Interplay Between Routing and Distributed Source Coding in Wireless Sensor Network
—Recent Advances in Distributed Source Coding (DSC) for mission-driven Wireless Sensor Networks (WSN) are related to the coding for multiple correlated sensors in applications su...
Honggang Wang, Dongming Peng, Wei Wang 0015, Hamid...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 7 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
15 years 7 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis