Sciweavers

1653 search results - page 141 / 331
» Timed analysis of security protocols
Sort
View
145
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 3 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
132
Voted
ETFA
2008
IEEE
15 years 3 months ago
Self-configuration of an adaptive TDMA wireless communication protocol for teams of mobile robots
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such...
Frederico Santos, Luís Almeida, Luís...
155
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Medium Access Control Signaling for Reliable Spectrum Agile Radios
—We address the problem of collaborative sensing in cognitive radios. In a cognitive radio network, all the nodes may sense the spectrum simultaneously. They should then exchange...
Ehsan Azarnasab, Rong-Rong Chen, Koon Hoo Teo, Zhi...
127
Voted
GW
2005
Springer
161views Biometrics» more  GW 2005»
15 years 9 months ago
Captured Motion Data Processing for Real Time Synthesis of Sign Language
Abstract. The work described in this abstract presents a roadmap towards the creation and specification of a virtual humanoid capable of performing expressive gestures in real tim...
Alexis Heloir, Sylvie Gibet, Franck Multon, Nicola...
ENTCS
2006
103views more  ENTCS 2006»
15 years 3 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström