Sciweavers

1737 search results - page 147 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
144
Voted
GD
2005
Springer
15 years 10 months ago
Network Analysis and Visualisation
A workshop on Network Analysis and Visualisation was held on September 11, 2005 in Limerick Ireland, in conjunction with 2005 Graph Drawing conference. This report review the backg...
Seok-Hee Hong
PERCOM
2008
ACM
16 years 4 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
154
Voted
ISSTA
2000
ACM
15 years 9 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
DGO
2008
112views Education» more  DGO 2008»
15 years 6 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
163
Voted
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 4 months ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...