Sciweavers

798 search results - page 68 / 160
» Statecharts as Protocols for Objects
Sort
View
SENSYS
2005
ACM
15 years 5 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
TACAS
2001
Springer
119views Algorithms» more  TACAS 2001»
15 years 4 months ago
Compositional Message Sequence Charts
Abstract. A message sequence chart (MSC) is a standard notation for describing the interaction between communicating objects. It is popular among the designers of communication pro...
Elsa L. Gunter, Anca Muscholl, Doron Peled
ACMICEC
2007
ACM
115views ECommerce» more  ACMICEC 2007»
15 years 3 months ago
RFID meets bluetooth in a semantic based u-commerce environment
We present a novel resource discovery framework for u-commerce. Both the original RFID data exchange protocol and the Bluetooth Service Discovery Protocol have been extended in or...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
COCOON
2007
Springer
15 years 3 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
FAST
2010
15 years 2 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....