Sciweavers

3504 search results - page 419 / 701
» Secure protocol composition
Sort
View
ADHOC
2006
155views more  ADHOC 2006»
15 years 2 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
131
Voted
DAC
2000
ACM
16 years 3 months ago
Synthesis and optimization of coordination controllers for distributed embedded systems
A main advantage of control composition with modal processes [4] is the enhanced retargetability of the composed behavior over a wide variety of target architectures. Unlike previ...
Pai H. Chou, Gaetano Borriello
83
Voted
VTC
2008
IEEE
15 years 9 months ago
Event-Based Addressing for Information Distribution in Dynamic Networks
— A salient feature of upcoming communication networks is unprecedented dynamicity, which can only be handled in a large scale by introducing self-configuration and self-maintena...
Cornelia Kappler, Kostas Pentikousis, Carlos Pinho
116
Voted
SEFM
2007
IEEE
15 years 8 months ago
Disciplining Orchestration and Conversation in Service-Oriented Computing
We give a formal account of a calculus for modeling service-based systems, suitable to describe both service composition (orchestration) and the protocol that services run when in...
Ivan Lanese, Francisco Martins, Vasco Thudichum Va...
NIME
2004
Springer
100views Music» more  NIME 2004»
15 years 8 months ago
TOASTER and KROONDE: High-Resolution and High-Speed Real-time Sensor Interfaces
High capacity of transmission lines (Ethernet in particular) is much higher than what imposed by MIDI today. So it is possible to use capturing interfaces with high-speed and high...
Thierry Coduys, Cyrille Henry, Arshia Cont