Sciweavers

93 search results - page 6 / 19
» A comparative analysis of groupware application protocols
Sort
View
AUSDM
2007
Springer
165views Data Mining» more  AUSDM 2007»
13 years 11 months ago
A New Efficient Privacy-Preserving Scalar Product Protocol
Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically repre...
Artak Amirbekyan, Vladimir Estivill-Castro
ATAL
2004
Springer
14 years 24 days ago
A Scalable Petri Net Representation of Interaction Protocols for Overhearing
In open distributed multi-agent systems, agents often coordinate using standardized agent communications. Thus, representing agent conversations is an important aspect of multi-age...
Gery Gutnik, Gal A. Kaminka
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICPADS
2005
IEEE
14 years 1 months ago
Delay-Energy Aware Routing Protocol for Sensor and Actor Networks
We present a novel Delay-Energy Aware Routing Protocol (DEAP) for for heterogeneous sensor and actor networks. DEAP enable a wide range of tradoffs between delay and energy consum...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli
INFOCOM
2007
IEEE
14 years 1 months ago
An Experimental Evaluation of Voice Quality Over the Datagram Congestion Control Protocol
— Most Internet telephony applications currently use either TCP or UDP to carry their voice-over-IP (VoIP) traffic. This choice can be problematic, because TCP is not well suite...
H. Vlad Balan, Lars Eggert, Saverio Niccolini, Mar...