Quantcast
Channel: CPS-VO - protocol
Browsing all 47 articles
Browse latest View live

Dynamic Tuning Retransmission Limit of IEEE 802.11 MAC Protocol for Networked...

Authors: Jia Bai, Emeka P. Eyisi, Yuan Xue, and Xenofon D. Koutsoukos Appeared In: Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber,...

View Article


Declarative Access Policies Based on Objects, Relationships, and States

Chen, Simin.  2012.  Declarative Access Policies Based on Objects, Relationships, and States. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity....

View Article


Privacy-preserving channel access using blindfolded packet transmissions

Banerjee, D., Bo Dong, Biswas, S., Taghizadeh, M..  2014.  Privacy-preserving channel access using blindfolded packet transmissions. Communication Systems and Networks (COMSNETS), 2014 Sixth...

View Article

Delegated Authenticated Authorization for Constrained Environments

Gerdes, S., Bergmann, O., Bormann, C..  2014.  Delegated Authenticated Authorization for Constrained Environments. Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. :654-659.

View Article

Smart diagnose procedure for data acquisition systems inside dams

Bande, V., Pop, S., Pitica, D..  2014.  Smart diagnose procedure for data acquisition systems inside dams. Design and Technology in Electronic Packaging (SIITME), 2014 IEEE 20th International Symposium...

View Article


Key Management for Static Wireless Sensor Networks With Node Adding

Gandino, F., Montrucchio, B., Rebaudengo, M..  2014.  Key Management for Static Wireless Sensor Networks With Node Adding. Industrial Informatics, IEEE Transactions on. 10:1133-1143.

View Article

Modeling Network Medium Access Protocols for Network Quality of Service Analysis

Emfinger, W., Karsai, G..  2015.  Modeling Network Medium Access Protocols for Network Quality of Service Analysis. Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on....

View Article

Verification across Intellectual Property Boundaries

Abstract: Sagar Chaki License:  Creative Commons Attribution-NonCommercial 3.0 read more

View Article


Dynamic Tuning Retransmission Limit of IEEE 802.11 MAC Protocol for Networked...

Authors: Jia Bai, Emeka P. Eyisi, Yuan Xue, and Xenofon D. Koutsoukos Appeared In: Green Computing and Communications (GreenCom), 2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber,...

View Article


Declarative Access Policies Based on Objects, Relationships, and States

Chen, Simin.  2012.  Declarative Access Policies Based on Objects, Relationships, and States. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity....

View Article

Declarative Access Policies based on Objects, Relationships, and States

Simin Chen.  2012.  Declarative Access Policies based on Objects, Relationships, and States. SPLASH '12 Proceedings of the 3rd annual conference on Systems, programming, and applications: software for...

View Article

Privacy-preserving channel access using blindfolded packet transmissions

Banerjee, D., Bo Dong, Biswas, S., Taghizadeh, M..  2014.  Privacy-preserving channel access using blindfolded packet transmissions. Communication Systems and Networks (COMSNETS), 2014 Sixth...

View Article

Delegated Authenticated Authorization for Constrained Environments

Gerdes, S., Bergmann, O., Bormann, C..  2014.  Delegated Authenticated Authorization for Constrained Environments. Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. :654-659.

View Article


Smart diagnose procedure for data acquisition systems inside dams

Bande, V., Pop, S., Pitica, D..  2014.  Smart diagnose procedure for data acquisition systems inside dams. Design and Technology in Electronic Packaging (SIITME), 2014 IEEE 20th International Symposium...

View Article

Key Management for Static Wireless Sensor Networks With Node Adding

Gandino, F., Montrucchio, B., Rebaudengo, M..  2014.  Key Management for Static Wireless Sensor Networks With Node Adding. Industrial Informatics, IEEE Transactions on. 10:1133-1143.

View Article


Modeling Network Medium Access Protocols for Network Quality of Service Analysis

Emfinger, W., Karsai, G..  2015.  Modeling Network Medium Access Protocols for Network Quality of Service Analysis. Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on....

View Article

Verification across Intellectual Property Boundaries

Abstract: Sagar Chaki License:  Creative Commons Attribution-NonCommercial 3.0 read more

View Article


Chen_Declarative_Access_JA.pdf

View Article

"Caesar: high-speed and memory-efficient forwarding engine for future...

M. Moradi, F. Qian, Q. Xu, Z. M. Mao, D. Bethea, M. K. Reiter.  2015.  "Caesar: high-speed and memory-efficient forwarding engine for future internet architecture". 2015 ACM/IEEE Symposium on...

View Article

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic...

Jin, Y., Zhu, H., Shi, Z., Lu, X., Sun, L..  2015.  Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. 2015 IEEE International Conference on Communications (ICC)....

View Article
Browsing all 47 articles
Browse latest View live