Sciweavers

206 search results - page 26 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
109
Voted
LCN
2006
IEEE
15 years 6 months ago
ZONER: A ZONE-based Sensor Relocation Protocol for Mobile Sensor Networks
— In mobile sensor networks, self-deployment and relocation are two different research issues, both of which involve autonomous sensor movement. They share in most cases a common...
Xu Li, Nicola Santoro
SIGECOM
2005
ACM
106views ECommerce» more  SIGECOM 2005»
15 years 6 months ago
On decentralized incentive compatible mechanisms
Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally ...
Ahuva Mu'alem
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
102
Voted
SEKE
2005
Springer
15 years 6 months ago
Knowledge Reuse for Software Reuse
Various intelligent component retrieval techniques have been developed to assist a developer discover or locate components in an efficient manner. These techniques share a common ...
Frank McCarey, Mel Ó Cinnéide, Nicho...
BIRTHDAY
2004
Springer
15 years 5 months ago
Retracing the Semantics of CSP
CSP was originally introduced as a parallel programming language in which sequential imperative processes execute concurrently and communicate by synchronized input and output. The...
Stephen D. Brookes