Sciweavers

3504 search results - page 603 / 701
» Secure protocol composition
Sort
View
MIDDLEWARE
2005
Springer
15 years 7 months ago
Distributed collaboration for event detection in wireless sensor networks
With the advancement of technology in micro-electronics and wireless communication, small miniature devices called sensor nodes can be used to perform various tasks by forming the...
A. V. U. Phani Kumar, Adi Mallikarjuna Reddy V, D....
MIDDLEWARE
2004
Springer
15 years 6 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
APN
2010
Springer
15 years 6 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg
CAV
2000
Springer
197views Hardware» more  CAV 2000»
15 years 5 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin
SIGCOMM
1998
ACM
15 years 5 months ago
An Active Service Framework and Its Application to Real-Time Multimedia Transcoding
Several recent proposals for an “active networks” architecture advocate the placement of user-defined computation within the network as a key mechanism to enable a wide range...
Elan Amir, Steven McCanne, Randy H. Katz