Sciweavers

183 search results - page 20 / 37
» Stochastic Modelling of Communication Protocols from Source ...
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
IPPS
2007
IEEE
15 years 6 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni
INFOCOM
2012
IEEE
13 years 2 months ago
Achievable transmission capacity of cognitive mesh networks with different media access control
—Spectrum sharing is an emerging mechanism to resolve the conflict between the spectrum scarcity and the growing demands for the wireless broadband access. In this paper we inve...
Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng
ICPP
2006
IEEE
15 years 5 months ago
A Performance Model of the Krak Hydrodynamics Application
We present an analytic performance model of a largescale hydrodynamics code developed at Los Alamos National Laboratory. This modeling work is part of an ongoing effort to develop...
Kevin J. Barker, Scott Pakin, Darren J. Kerbyson
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 6 months ago
opaal: A Lattice Model Checker
Abstract. We present a new open source model checker, opaal, for automatic verification of models using lattice automata. Lattice automata allow the users to incorporate abstracti...
Andreas Engelbredt Dalsgaard, René Rydhof H...