NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 38
1.
  • Dynamic Beacon Mobility Sch... Dynamic Beacon Mobility Scheduling for Sensor Localization
    Xu Li; Mitton, N.; Simplot-Ryl, I. ... IEEE transactions on parallel and distributed systems, 08/2012, Letnik: 23, Številka: 8
    Journal Article
    Recenzirano

    In mobile-beacon assisted sensor localization, beacon mobility scheduling aims to determine the best beacon trajectory so that each sensor receives sufficient beacon signals and becomes localized ...
Celotno besedilo
2.
  • Hypocomb: Bounded-Degree Lo... Hypocomb: Bounded-Degree Localized Geometric Planar Graphs for Wireless Ad Hoc Networks
    Xu Li; Mitton, N.; Simplot-Ryl, I. ... IEEE transactions on parallel and distributed systems, 07/2013, Letnik: 24, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    We propose a radically new family of geometric graphs, i.e., Hypocomb (HC), Reduced Hypocomb (RHC), and Local Hypocomb (LHC). HC and RHC are extracted from a complete graph; LHC is extracted from a ...
Celotno besedilo

PDF
3.
  • Application of contract-bas... Application of contract-based security assertion monitoring framework for telecommunications software engineering
    Hoole, Alexander M.; Traore, Issa; Simplot-Ryl, Isabelle Mathematical and computer modelling, 02/2011, Letnik: 53, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Telecommunication software systems, containing security vulnerabilities, continue to be created and released to consumers. We need to adopt improved software engineering practices to reduce the ...
Celotno besedilo

PDF
4.
  • Connectivity Preservation a... Connectivity Preservation and Key Distribution in Wireless Sensor Networks Using Multi-deployment Scheme
    Simplot-Ryl, David; Simplot-Ryl, Isabelle Lecture notes in computer science, 2006
    Book Chapter, Conference Proceeding
    Recenzirano

    Secure key establishment in wireless sensor networks has been shown to be efficient. For sake of computation power, pre- distribution of symmetric keys is recommended. In such schemes, a set S of ...
Celotno besedilo
5.
Celotno besedilo
6.
  • A novel family of geometric... A novel family of geometric planar graphs for wireless ad hoc networks
    Xu Li; Mitton, N.; Simplot-Ryl, I. ... 2011 Proceedings IEEE INFOCOM, 2011-April
    Conference Proceeding
    Odprti dostop

    We propose a radically new family of geometric graphs, i.e., Hypocomb, Reduced Hypocomb and Local Hypocomb. The first two are extracted from a complete graph; the last is extracted from a Unit Disk ...
Celotno besedilo

PDF
7.
  • Component composition prese... Component composition preserving behavioral contracts based on communication traces
    Bailly, Arnaud; Clerbout, Mireille; Simplot-Ryl, Isabelle Theoretical computer science, 10/2006, Letnik: 363, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    This paper investigates the compositional properties of reusable software components defined with explicit dependencies and behavioural contracts expressing rely-guarantee specifications in the form ...
Celotno besedilo

PDF
8.
  • On-device control flow veri... On-device control flow verification for Java programs
    Fontaine, Arnaud; Hym, Samuel; Simplot-Ryl, Isabelle Proceedings of the Third international conference on Engineering secure software and systems, 02/2011
    Conference Proceeding
    Recenzirano

    While mobile devices have become ubiquitous and generally multi-application capable, their operating systems provide few high level mechanisms to protect services offered by application vendors ...
Celotno besedilo
9.
  • Component Composition Prese... Component Composition Preserving Behavioural Contracts Based on Communication Traces
    Bailly, Arnaud; Clerbout, Mireille; Simplot-Ryl, Isabelle Implementation and Application of Automata, 2006
    Book Chapter, Conference Proceeding
    Recenzirano

    This paper investigates the compositional properties of reusable software components defined with explicit dependencies and behavioural contracts expressing rely-guarantee specifications in the form ...
Celotno besedilo
10.
Celotno besedilo
1 2 3 4
zadetkov: 38

Nalaganje filtrov