Sciweavers

3053 search results - page 88 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
133
Voted
EURONGI
2008
Springer
15 years 2 months ago
Performance Evaluation of DTSN in Wireless Sensor Networks
The guaranteed delivery of critical data is an essential requirement in most Wireless Sensor Network (WSN) applications. The paucity of energy, communication, processing and storag...
Francisco Rocha, António Grilo, Paulo Rog&e...
129
Voted
FAC
2010
106views more  FAC 2010»
14 years 10 months ago
Automatic verification of Java programs with dynamic frames
Framing in the presence of data abstraction is a challenging and important problem in the verification of object-oriented programs [LLM07]. The dynamic frames approach is a promisi...
Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Sc...
112
Voted
IFIP
2009
Springer
14 years 10 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
89
Voted
IEICET
2006
84views more  IEICET 2006»
15 years 23 days ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
86
Voted
ICRA
2008
IEEE
147views Robotics» more  ICRA 2008»
15 years 7 months ago
Automatic deployment and formation control of decentralized multi-agent networks
— Novel tools are needed to deploy multi-agent networks in applications that require a high degree of accuracy in the achievement and maintenance of geometric formations. This is...
Brian Stephen Smith, Magnus Egerstedt, Ayanna M. H...