Sciweavers

4305 search results - page 138 / 861
» Analysing Protocol Implementations
Sort
View
EMISA
2005
Springer
14 years 2 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle
CONCUR
2008
Springer
13 years 11 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
CONEXT
2008
ACM
13 years 11 months ago
Supporting delay-intolerant applications
Reliable transport protocols that offer low per-packet delays are becoming increasingly important, particularly for critical infrastructure services. Forward error correction (FEC...
Shufeng Huang
USENIX
1993
13 years 10 months ago
Fremont: A System for Discovering Network Characteristics and Problems
In this paper we present an architecture and prototype implementation for discovering key network characteristics, such as hosts, gateways, and topology. The Fremont system uses a...
David C. M. Wood, Sean S. Coleman, Michael F. Schw...
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
14 years 1 months ago
Software Versus Hardware Shared-Memory Implementation: A Case Study
We comparethe performance of software-supported shared memory on a general-purpose network to hardware-supported shared memory on a dedicated interconnect. Up to eight processors,...
Alan L. Cox, Sandhya Dwarkadas, Peter J. Keleher, ...