Sciweavers

674 search results - page 13 / 135
» Resource Bound Certification
Sort
View
ESA
2006
Springer
95views Algorithms» more  ESA 2006»
15 years 1 months ago
Resource Allocation in Bounded Degree Trees
We study the bandwidth allocation problem (bap) in bounded degree trees. In this problem we are given a tree and a set of connection requests. Each request consists of a path in t...
Reuven Bar-Yehuda, Michael Beder, Yuval Cohen, Dro...
98
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
SIGUCCS
2003
ACM
15 years 2 months ago
Colgate university's ITS study groups: in-house personal and professional development
Internal Study Groups at Colgate University have increased staff members’ technical knowledge, encouraged additional study on selected topics, and resulted in achievement of ind...
Jeanne Kellogg
JCS
2006
118views more  JCS 2006»
14 years 9 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
NMR
2004
Springer
15 years 2 months ago
A resource bounded default logic
This paper presents statistical default logic, an expansion of classical (i.e., Reiter) default logic that allows us to model common inference patterns found in standard inferenti...
Gregory R. Wheeler