Sciweavers

14824 search results - page 2941 / 2965
» Security - Introduction
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
14 years 9 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
INFOCOM
2010
IEEE
14 years 9 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
INFOCOM
2010
IEEE
14 years 9 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
INTERNET
2010
119views more  INTERNET 2010»
14 years 9 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
IOR
2010
169views more  IOR 2010»
14 years 9 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
« Prev « First page 2941 / 2965 Last » Next »