Sciweavers

631 search results - page 30 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
MOBIHOC
2007
ACM
16 years 1 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ICNP
2000
IEEE
15 years 6 months ago
Hop Integrity in Computer Networks
A computer network is said to provide hop integrity iff when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was ind...
Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang,...
RTAS
2000
IEEE
15 years 5 months ago
An Approach for Supporting Temporal Partitioning and Software Reuse in Integrated Modular Avionics
The Integrated Modular Avionics (IMA) approach can achieve lower overall hardware costs and reduced level of spares by getting multiple applications that have traditionally been i...
Mohamed F. Younis, Mohamed Aboutabl, Daeyoung Kim
HICSS
2003
IEEE
159views Biometrics» more  HICSS 2003»
15 years 6 months ago
Emergent Structures in Supply Chains - A Study Integrating Agent-Based and System Dynamics Modeling
Supply chain management is a demanding and complicated task due to its broad scope and the strong connectedness of its objects and issues. In order to make theoretical investigati...
Nadine Schieritz, Andreas Größler
CPAIOR
2009
Springer
15 years 8 months ago
Six Ways of Integrating Symmetries within Non-overlapping Constraints
Abstract: This paper introduces six ways for handling a chain of lexicographic ordering constraint between the origins of identical orthotopes (e.g., rectangles, boxes, hyper-recta...
Magnus Ågren, Nicolas Beldiceanu, Mats Carls...