Sciweavers

4305 search results - page 752 / 861
» Analysing Protocol Implementations
Sort
View
106
Voted
IPPS
2000
IEEE
15 years 7 months ago
Study of a Multilevel Approach to Partitioning for Parallel Logic Simulation
Parallel simulation techniques are often employed to meet the computational requirements of large hardware simulations in order to reduce simulation time. In addition, partitionin...
Swaminathan Subramanian, Dhananjai Madhava Rao, Ph...
134
Voted
NDSS
2000
IEEE
15 years 7 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
146
Voted
MOBIHOC
2000
ACM
15 years 7 months ago
Proximity awareness and fast connection establishment in Bluetooth
Bluetooth is a promising new technology that enables portable devices to form short-range wireless ad hoc networks and relies on spread spectrum frequency hopping (FH) techniques f...
Theodoros Salonidis, Pravin Bhagwat, Leandros Tass...
114
Voted
AGENTCL
2000
Springer
15 years 7 months ago
Semantics of Communicating Agents Based on Deduction and Abduction
Intelligent agents in the agent language 3APL are computational entities consisting of beliefs and goals which make up their mental state. In this paper, we integrate communicatio...
Koen V. Hindriks, Frank S. de Boer, Wiebe van der ...
105
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran