Sciweavers

332 search results - page 39 / 67
» adhoc 2008
Sort
View
ECEASST
2008
83views more  ECEASST 2008»
14 years 10 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
CSI
2007
83views more  CSI 2007»
14 years 10 months ago
A model-driven choreography conceptual framework
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Sinuhé Arroyo, Alistair Duke, José M...
JVCA
2008
73views more  JVCA 2008»
14 years 10 months ago
A unified handling of immiscible and miscible fluids
Conventional level set based approaches have an inherent difficulty in tracking miscible fluids due to its discrete treatment for interface. This paper proposes a unified framewor...
Jinho Park, Younghui Kim, Daehyeon Wi, Nahyup Kang...
TWC
2008
99views more  TWC 2008»
14 years 9 months ago
MAP-Based Code-Aided Hypothesis Testing
This contribution deals with code-aided hypothesis testing for wireless digital receivers. We provide a theoretical justification for a hypothesis testing algorithm that was previo...
Cédric Herzet, Henk Wymeersch, Frederik Sim...