Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems最新文献

筛选
英文 中文
Routing in Generalized Geometric Inhomogeneous Random Graphs - (Extended Abstract) 广义几何非齐次随机图中的路由-(扩展摘要)
Andrés Sevilla, Antonio Fernández
{"title":"Routing in Generalized Geometric Inhomogeneous Random Graphs - (Extended Abstract)","authors":"Andrés Sevilla, Antonio Fernández","doi":"10.1007/978-3-030-67087-0_25","DOIUrl":"https://doi.org/10.1007/978-3-030-67087-0_25","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"33 1","pages":"368-373"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75579682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Framework for Optimization of Local Dissemination in Wireless Networks 无线网络局部传播优化的通用框架
D. Kowalski, Miguel A. Mosteiro, K. Wadhwa
{"title":"Generic Framework for Optimization of Local Dissemination in Wireless Networks","authors":"D. Kowalski, Miguel A. Mosteiro, K. Wadhwa","doi":"10.1007/978-3-030-67087-0_16","DOIUrl":"https://doi.org/10.1007/978-3-030-67087-0_16","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"10 1","pages":"244-260"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75006181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying Safety of Parameterized Heard-Of Algorithms 参数化听觉算法的安全性验证
Zeinab Ganjei, Ahmed Rezine, P. Eles, Zebo Peng
{"title":"Verifying Safety of Parameterized Heard-Of Algorithms","authors":"Zeinab Ganjei, Ahmed Rezine, P. Eles, Zebo Peng","doi":"10.1007/978-3-030-67087-0_14","DOIUrl":"https://doi.org/10.1007/978-3-030-67087-0_14","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"37 1","pages":"209-226"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84852280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis 通过访问日志分析,利用可疑规则高效管理安全策略
Maryem Ait El Hadj, A. Khoumsi, Yahya Benkaouz, M. Erradi
{"title":"Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis","authors":"Maryem Ait El Hadj, A. Khoumsi, Yahya Benkaouz, M. Erradi","doi":"10.1007/978-3-030-31277-0_16","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_16","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"116 1","pages":"250-266"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79588353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Self-stabilization Overhead: A Case Study on Coded Atomic Storage 自稳定开销:编码原子存储的案例研究
Chryssis Georgiou, R. Gustafsson, Andreas Lindhé, E. Schiller
{"title":"Self-stabilization Overhead: A Case Study on Coded Atomic Storage","authors":"Chryssis Georgiou, R. Gustafsson, Andreas Lindhé, E. Schiller","doi":"10.1007/978-3-030-31277-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_9","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"1 1","pages":"131-147"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88704098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bitcoin Security with Post Quantum Cryptography 后量子加密的比特币安全
Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi
{"title":"Bitcoin Security with Post Quantum Cryptography","authors":"Meryem Cherkaoui Semmouni, Abderrahmane Nitaj, M. Belkasmi","doi":"10.1007/978-3-030-31277-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_19","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"80 1","pages":"281-288"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72646190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
How to Choose Its Parents in the Tangle 如何在纠结中选择父母
Vidal Attias, Quentin Bramas
{"title":"How to Choose Its Parents in the Tangle","authors":"Vidal Attias, Quentin Bramas","doi":"10.1007/978-3-030-31277-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_18","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"29 1","pages":"275-280"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83376376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal Verification of UML State Machine Diagrams Using Petri Nets 使用Petri网的UML状态机图的形式化验证
Achraf Lyazidi, S. Mouline
{"title":"Formal Verification of UML State Machine Diagrams Using Petri Nets","authors":"Achraf Lyazidi, S. Mouline","doi":"10.1007/978-3-030-31277-0_5","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_5","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"85 1","pages":"67-74"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73555514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm 基于深度学习和优化自适应启发式搜索算法的云环境下高效网络入侵检测
Z. Chiba, N. Abghour, K. Moussaid, Amina El Omri, M. Rida
{"title":"An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm","authors":"Z. Chiba, N. Abghour, K. Moussaid, Amina El Omri, M. Rida","doi":"10.1007/978-3-030-31277-0_15","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_15","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"45 1","pages":"235-249"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90553069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CUDA-DTM: Distributed Transactional Memory for GPU Clusters CUDA-DTM: GPU集群的分布式事务内存
Samuel Irving, Sui Chen, Lu Peng, C. Busch, M. Herlihy, Christopher J. Michael
{"title":"CUDA-DTM: Distributed Transactional Memory for GPU Clusters","authors":"Samuel Irving, Sui Chen, Lu Peng, C. Busch, M. Herlihy, Christopher J. Michael","doi":"10.1007/978-3-030-31277-0_12","DOIUrl":"https://doi.org/10.1007/978-3-030-31277-0_12","url":null,"abstract":"","PeriodicalId":92573,"journal":{"name":"Proceedings of the ... International Conference on Embedded Networked Sensor Systems. International Conference on Embedded Networked Sensor Systems","volume":"30 1","pages":"183-199"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74437566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信