Sciweavers

448 search results - page 54 / 90
» k-anonymous message transmission
Sort
View
CSREASAM
2006
15 years 1 months ago
On Achieving Trustworthy SOA-Based Web Services
This work is inspired by the intend to construct SOABased E-Government. We first emphasize the importance of taking measures for solving security problems facing Web Services, we ...
Jianwu Zheng, Mingsheng Liu, Hui Liu
DAGSTUHL
2003
15 years 1 months ago
Why Timed Sequence Diagrams Require Three-Event Semantics
STAIRS is an approach to the compositional development of sequence diagrams supporting the specification of mandatory as well as potential behavior. In order to express the necess...
Øystein Haugen, Knut Eilif Husa, Ragnhild K...
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 12 months ago
Fault Tolerant Wireless Sensor MAC Protocol for Efficient Collision Avoidance
In sensor networks communication by broadcast methods involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collisi...
Abhishek Samanta, Dripto Bakshi
CORR
2010
Springer
207views Education» more  CORR 2010»
14 years 12 months ago
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
This paper presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adver...
Andréa W. Richa, Christian Scheideler, Stef...
FGCS
2010
76views more  FGCS 2010»
14 years 10 months ago
Self-healing network for scalable fault-tolerant runtime environments
Scalable and fault tolerant runtime environments are needed to support and adapt to the underlying libraries and hardware which require a high degree of scalability in dynamic larg...
Thara Angskun, Graham E. Fagg, George Bosilca, Jel...