Sciweavers

422 search results - page 6 / 85
» Protocol Specialization
Sort
View
CONEXT
2006
ACM
15 years 5 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
ERSHOV
2009
Springer
15 years 3 months ago
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
Abstract. The Java Supercompiler (JScp) is a specializer of Java programs based on the Turchin's supercompilation method and extended to support imperative and object-oriented...
Andrei V. Klimov
AIME
2009
Springer
15 years 6 months ago
Towards the Merging of Multiple Clinical Protocols and Guidelines via Ontology-Driven Modeling
Abstract. Decision support systems based on computerized Clinical Protocols (CP) and Clinical Practice Guidelines (CPG) fall short when dealing with patient co-morbidites, as this ...
Samina Raza Abidi, Syed Sibte Raza Abidi
COMPSAC
2006
IEEE
15 years 3 months ago
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
WINE
2007
Springer
109views Economy» more  WINE 2007»
15 years 5 months ago
Incentive-Compatible Interdomain Routing with Linear Utilities
We revisit the problem of incentive-compatible interdomain routing, examining the, quite realistic, special case in which the autonomous systems’ (ASes’) utilities are linear f...
Alexander Hall, Evdokia Nikolova, Christos H. Papa...