Sciweavers

1612 search results - page 303 / 323
» About models of security protocols
Sort
View
ACSC
2005
IEEE
14 years 2 months ago
A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptivel
The proposed Fuzzy Logic Controller (FLC) is a novel approach for dynamic buffer tuning at the user/server level. It eliminates buffer overflow by ensuring that the buffer length ...
Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dil...
ATAL
2005
Springer
14 years 2 months ago
Argument-based negotiation in a social context
Argumentation-based negotiation (ABN) provides agents with an effective means to resolve conflicts within a multi-agent society. However, to engage in such argumentative encounter...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
INFOCOM
2000
IEEE
14 years 27 days ago
Consideration of Receiver Interest for IP Multicast Delivery
—Large-scale applications are characterized by a large number of dynamic and often interactive group members. The nature of these applications is such that participants are not i...
Brian Neil Levine, Jon Crowcroft, Christophe Diot,...
FOIKS
2008
Springer
13 years 10 months ago
Towards a Fuzzy Logic for Automated Multi-issue Negotiation
Abstract. We present a novel logic-based approach to automate multi-issue bilateral negotiation in e-marketplaces. In such frameworks issues to negotiate on can be multiple, interr...
Azzurra Ragone, Umberto Straccia, Tommaso Di Noia,...
FORMATS
2010
Springer
13 years 6 months ago
Layered Composition for Timed Automata
Abstract. We investigate layered composition for real-time systems modelled as (networks of) timed automata (TA). We first formulate the principles of layering and transition indep...
Ernst-Rüdiger Olderog, Mani Swaminathan