Sciweavers

344 search results - page 32 / 69
» Optimization problems from feature testing of communication ...
Sort
View
INFOCOM
2003
IEEE
15 years 7 months ago
Energy Efficient Routing in Ad Hoc Disaster Recovery Networks
—The terrorist attacks on September 11, 2001 have drawn attention to the use of wireless technology in order to locate survivors of structural collapse. We propose to construct a...
Gil Zussman, Adrian Segall
CONEXT
2006
ACM
15 years 8 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
CORR
2010
Springer
105views Education» more  CORR 2010»
15 years 2 months ago
The Impact of Topology on Byzantine Containment in Stabilization
Self-stabilization is an versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of ...
Swan Dubois, Toshimitsu Masuzawa, Sébastien...
DAC
1994
ACM
15 years 6 months ago
BDD Variable Ordering for Interacting Finite State Machines
We address the problem of obtaining good variable orderings for the BDD representation of a system of interacting finite state machines (FSMs). Orderings are derived from the comm...
Adnan Aziz, Serdar Tasiran, Robert K. Brayton
TMC
2012
13 years 4 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...