• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 125
Next 10 →

Subspace Communication

by Josep Font-segura, Prof Gregori , 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract - Add to MetaCart
of the spectrum by legacy sys-tems. Cognitive radio exhibits a tremendous promise for increasing the spectral efficiency for future wireless systems. Ideally, new secondary users would have a perfect panorama of the spectrum usage, and would opportunistically communicate over the available re-sources without

An Approach to Verification and Validation of a Reliable Multicasting Protocol

by Nasa/wvu Software Iv, V Facility, John R. Cauahan, Todd L. Montgomery, John R. Cauahan, Todd L. Montgomery
"... Abstract: This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. Tile protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a ..."
Abstract - Add to MetaCart
combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concun'ent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) tile initial coding

Formal Privacy Analysis of Communication Protocols for Identity Management

by Meilof Veeningen, Benne De Weger, Nicola Zannone
"... Abstract. Over the years, formal methods have been developed for the analy-sis of security and privacy aspects of communication in IT systems. However, existing methods are insufficient to deal with privacy, especially in identity man-agement (IdM), as they fail to take into account whether personal ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
personal information can be linked to its data subject. In this paper, we propose a general formal method to analyze privacy of communication protocols for IdM. To express privacy, we represent knowledge of personal information in a three-layer model. We show how to deduce knowledge from observed messages

On Modeling Low-Power Wireless Protocols Based on Synchronous Packet Transmissions

by unknown authors
"... Abstract—Mathematical models play a pivotal role in understanding and designing advanced low-power wireless systems. However, the distributed and uncoordinated operation of traditional multi-hop low-power wireless protocols greatly complicates their accurate modeling. This is mainly because these pr ..."
Abstract - Add to MetaCart
experiments on a 139-node testbed, that characterizing packet receptions and losses as a sequence of independent and identically distributed (i.i.d.) Bernoulli trials—a common assumption in protocol modeling but often illegitimate for LT—is largely valid for ST. We then show how this finding simplifies

Formal Analysis of a Privacy-Preserving Billing Protocol

by Ro Arm, Roberto Carbone, Alessio Merlo
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract - Add to MetaCart
Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker

DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

by Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, Xingwei Wang
"... Abstract. Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attac ..."
Abstract - Add to MetaCart
attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment

Abstract Multichannel Communication in Contiki's Low-power IPv6 Stack

by Ipv Stack, Beshr Al Nahas, Beshr Al Nahas
"... Vast majority of wireless appliances used in household, industry and medical field share the ISM frequency band. These devices need to coexist and thus are challenged to tolerate their mutual interference. One way of dealing with this is by using frequency hopping; where the device changes its radio ..."
Abstract - Add to MetaCart
radio channel periodically. Consequently, communications will not suffer from the same interference each time; instead, it should be fairer and more stable. This thesis investigates the aforementioned problem in the field of low power wireless sensor networks and Internet of Things where Contiki OS

XTP specification and validation with LOTOS

by A. Benslimane, A. Abouaissa
"... The validation is a very important phase in the development cycle of communication protocols. This activity is frequently accomplished by a reachability analysis. In this paper, we are interested in the study of the XTP protocol that constitutes a new high speed transport protocol standardized by I ..."
Abstract - Add to MetaCart
by ISO. The objective is to detect different types of logic errors, before implementation phase, such as deadlock, unspecified reception and boundedness. To specify and verify XTP protocol, we use two formal models, the communicating finite state machine (C.F.S.M) to describe the behaviour of11we

Multi-Protocol Transport Layer QoS: An Emulation Based Performance Analysis for the Internet of Things

by James Wilcox, Dritan Kaleshi, Mahesh Sooriyabandara
"... Abstract—Application specific interaction models will be required to support efficient communications between distributed applica-tions with disparate network requirements within the Internet of Things. This paper shows that intelligently selected transport protocols are able to provide increased ef ..."
Abstract - Add to MetaCart
Abstract—Application specific interaction models will be required to support efficient communications between distributed applica-tions with disparate network requirements within the Internet of Things. This paper shows that intelligently selected transport protocols are able to provide increased

Guaranteeing Communication Quality in Real World WSN Deployments

by Fbk-irst Bruno, Kessler Foundation, Matteo Ceriotti, Dr. Amy, L. Murphy, Bruno Kessler Foundation (fbk-irst, Amy L. Murphy, Prof Prabal Dutta, Prof Koen Langendoen, Prof Leo Selavo
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract - Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Next 10 →
Results 1 - 10 of 125
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University