Sciweavers

3031 search results - page 571 / 607
» SNMS - Shadow Network Management System
Sort
View
CN
2007
172views more  CN 2007»
14 years 11 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
EXACT
2007
15 years 2 months ago
A Discourse Approach to Explanation Aware Knowledge Representation
This study describes a discourse approach to explanation aware knowledge representation. It presents a reasoning model that adheres to argumentation as found in written discourse,...
Andrew Potter
GLOBECOM
2007
IEEE
15 years 1 months ago
Hardware-Constrained Multi-Channel Cognitive MAC
—Open spectrum systems allow unlicensed secondary users equipped with cognitive radio to opportunistically access the spectrum underutilized by primary users. Cognitive radio has...
Juncheng Jia, Qian Zhang
CMS
2006
127views Communications» more  CMS 2006»
15 years 1 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
FORTE
1996
15 years 1 months ago
Combined Application of SDL-92, OMT, MSC and TTCN
The paper describes the application of SDL-92[1] and OMT[2] to the design of a V5.x Access Network interface. While OMT is used to model the management aspects of the system, typi...
Eurico Inocêncio, Manuel Ricardo, Hitoshi Sa...