Sciweavers

255 search results - page 10 / 51
» A Multiphased Approach for Modeling and Analysis of the BitT...
Sort
View
ESAS
2005
Springer
14 years 1 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
ICTAI
1997
IEEE
13 years 11 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
IAT
2008
IEEE
14 years 2 months ago
An Agent Modeling Language Implementing Protocols through Capabilities
In this paper we present how to use the Agent MOdeling LAnguage (AMOLA) to define agent interaction protocols and how to integrate these in an agent model. AMOLA provides the synt...
Nikolaos I. Spanoudakis, Pavlos Moraitis
BMCBI
2005
89views more  BMCBI 2005»
13 years 7 months ago
An empirical analysis of training protocols for probabilistic gene finders
Background: Generalized hidden Markov models (GHMMs) appear to be approaching acceptance as a de facto standard for state-of-the-art ab initio gene finding, as evidenced by the re...
William H. Majoros, Steven Salzberg
EUROCRYPT
2001
Springer
14 years 3 days ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk