Sciweavers

2652 search results - page 48 / 531
» Path Differentials and Applications
Sort
View
140
Voted
JCS
2010
80views more  JCS 2010»
14 years 10 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JKM
2008
161views more  JKM 2008»
15 years 3 months ago
A semantic web architecture for integrating competence management and learning paths
Purpose
Fotis Draganidis, Paraskevi Chamopoulou, Gregoris ...
131
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Random-access scheduling with service differentiation in wireless networks
— Recent years have seen tremendous growth in the deployment of Wireless Local Area Networks (WLANs). An important design issue in such networks is that of distributed scheduling...
Piyush Gupta, Yogesh Sankarasubramaniam, Alexander...
125
Voted
SENSYS
2003
ACM
15 years 8 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
124
Voted
ICC
2009
IEEE
141views Communications» more  ICC 2009»
15 years 10 months ago
Differential Space-Time-Frequency Codes for MB-OFDM UWB with Dual Carrier Modulation
Abstract—In a multiple-input multiple-output (MIMO) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband (UWB) system, coherent detection where the chann...
Le Chung Tran, Alfred Mertins