Sciweavers

100 search results - page 13 / 20
» A Kernel-Oriented Model for Coalition-Formation in General E...
Sort
View
ESORICS
2005
Springer
14 years 1 months ago
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
The abstraction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently si...
Michael Backes, Birgit Pfitzmann
AIM
2006
13 years 7 months ago
Comparative Analysis of Frameworks for Knowledge-Intensive Intelligent Agents
maintain awareness of its environment for a long period of time. Additionally, knowledge-intensive agents must be engineered such that their knowledge can be easily updated as envi...
Randolph M. Jones, Robert E. Wray III
WSC
1997
13 years 9 months ago
On the Effect and Control of Self-Similar Network Traffic: A Simulation Perspective
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...
Kihong Park
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ESIAT
2009
IEEE
13 years 5 months ago
Ocean Primary Production in China Shelf Sea Estimated with SeaWiFS and MODIS
Ocean primary production (OPP) is an important indicator of ocean ecological system. The spatial and temporal pattern of OPP is helpful for global climate change study. Remote sens...
Pifu Cong, Limei Qu, Zheng Niu