Sciweavers

798 search results - page 97 / 160
» Statecharts as Protocols for Objects
Sort
View
HPTS
1993
147views Database» more  HPTS 1993»
15 years 4 months ago
Generic Action Support for Distributed, Cooperative Applications
Elements of transaction processing become more and more accepted as a base for general purpose distributed computing.We have developed an action concept with an extended functiona...
Edgar Nett, Michael Mock
DIM
2007
ACM
15 years 3 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
DSN
2006
IEEE
15 years 3 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
MDM
2010
Springer
250views Communications» more  MDM 2010»
15 years 1 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
IWCMC
2010
ACM
15 years 1 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha