Sciweavers

1777 search results - page 154 / 356
» Programming Cryptographic Protocols
Sort
View
SAC
2009
ACM
15 years 8 months ago
Integrating standardized transaction protocols in service-oriented wireless sensor networks
Despite much research in the area of wireless sensor networks in recent years, the programming of sensor nodes is still time-consuming and tedious. A new paradigm which seems to b...
Christoph Reinke, Nils Hoeller, Jana Neumann, Sven...
FGCS
2008
140views more  FGCS 2008»
15 years 1 months ago
Blocking vs. non-blocking coordinated checkpointing for large-scale fault tolerant MPI Protocols
A long-term trend in high-performance computing is the increasing number of nodes in parallel computing platforms, which entails a higher failure probability. Fault tolerant progr...
Darius Buntinas, Camille Coti, Thomas Hérau...
IFIP
2010
Springer
14 years 11 months ago
Service Migration Protocol for NFC Links
Abstract. In future ubiquitous communication environments, users expect to move freely while continuously interacting with the available applications through a variety of devices. ...
Anders Nickelsen, Miquel Martin, Hans-Peter Schwef...
SIGSOFT
2007
ACM
16 years 2 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ISIPTA
2005
IEEE
115views Mathematics» more  ISIPTA 2005»
15 years 7 months ago
A Protocol for the Elicitation of Imprecise Probabilities
A protocol for the elicitation of imprecise probabilities based on linear programming is applied to the case of two continuous variables. Two medical experts were elicited. The re...
Alane Alves Silva, Fernando Campello de Souza