Sciweavers

234 search results - page 10 / 47
» An Analysis of Multiple Tutoring Protocols
Sort
View
BMCBI
2007
94views more  BMCBI 2007»
13 years 7 months ago
Model based analysis of real-time PCR data from DNA binding dye protocols
Background: Reverse transcription followed by real-time PCR is widely used for quantification of specific mRNA, and with the use of double-stranded DNA binding dyes it is becoming...
Mariano J. Alvarez, Guillermo J. Vila-Ortiz, Maria...
DAGSTUHL
2003
13 years 9 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
IH
1999
Springer
14 years 2 days ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
GLOBECOM
2008
IEEE
14 years 2 months ago
Terabit Ethernet: A Time-Space Carrier Sense Multiple Access Method
To achieve Terabit and Petabit switching, both time (high transmission speed) and space (multi-stage interconnection network) technologies are required. We propose an Ethernet for...
Joseph Y. Hui, David A. Daniel
GLOBECOM
2006
IEEE
14 years 1 months ago
Service Differentiation by a Link Layer Protocol Based on SR ARQ over a Satellite Channel
— This paper studies the case where multiple IP flows are aggregated over a single satellite channel and an error recovery by retransmissions is performed by SelectiveRepeat (SR...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...