Sciweavers

533 search results - page 41 / 107
» Protocol synthesis from timed and structured specifications
Sort
View
CN
2002
161views more  CN 2002»
15 years 1 months ago
Building multicast services from unicast forwarding and ephemeral state
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
Su Wen, Jim Griffioen, Kenneth L. Calvert
ASE
2008
135views more  ASE 2008»
15 years 1 months ago
Deriving event-based transition systems from goal-oriented requirements models
Goal-oriented methods are increasingly popular for elaborating software requirements. They offer systematic support for incrementally building intentional, structural, and operati...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
IJSNET
2008
113views more  IJSNET 2008»
15 years 1 months ago
Reservation-based protocol for monitoring applications using IEEE 802.15.4 sensor networks
: The IEEE 802.15.4 and Zigbee are protocols aimed at low-duty and low-power wireless sensor networks. Continuously monitoring applications such as applications of structural healt...
Vidya Krishnamurthy, Edward Sazonov
ICCV
1998
IEEE
16 years 3 months ago
A Real-Time Algorithm for Medical Shape Recovery
In this paper, we present a shape recovery technique in 2 0 and 3 0 with specific applications in visualizing and measuring anatomical shapes from medical images. This algorithm m...
Ravi Malladi, James A. Sethian