Sciweavers

620 search results - page 21 / 124
» The computational power of population protocols
Sort
View
FROCOS
2000
Springer
15 years 1 months ago
Non-Trivial Symbolic Computations in Proof Planning
Abstract. We discuss a pragmatic approach to integrate computer algebra into proof planning. It is based on the idea to separate computation and veri cation and can thereby exploit...
Volker Sorge
IJSNET
2006
145views more  IJSNET 2006»
14 years 10 months ago
RL-MAC: a reinforcement learning based MAC protocol for wireless sensor networks
:This paper introduces RL-MAC, a novel adaptive MediaAccess Control (MAC) protocol for Wireless Sensor Networks (WSN) that employs a reinforcement learning framework. Existing sche...
Zhenzhen Liu, Itamar Elhanany
PERCOM
2010
ACM
14 years 8 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
FOSSACS
2004
Springer
15 years 3 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
EUROPAR
2005
Springer
15 years 3 months ago
AGNO: An Adaptive Group Communication Scheme for Unstructured P2P Networks
— We present the Adaptive Group Notification (AGNO) scheme for efficiently contacting large peer populations in unstructured Peer-to-Peer networks. AGNO defines a novel implic...
Dimitrios Tsoumakos, Nick Roussopoulos