Sciweavers

4305 search results - page 839 / 861
» Analysing Protocol Implementations
Sort
View
EUROCRYPT
2004
Springer
14 years 14 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
HYBRID
2000
Springer
14 years 10 days ago
Beyond HYTECH: Hybrid Systems Analysis Using Interval Numerical Methods
Abstract. Sincehybridembeddedsystemsarepervasiveandoftensafetycritical, guarantees about their correct performance are desirable. The hybrid systemsmodelcheckerHyTech providessuch ...
Thomas A. Henzinger, Benjamin Horowitz, Rupak Maju...
IWAN
2000
Springer
14 years 10 days ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
VRML
1995
ACM
14 years 8 days ago
Internetwork Infrastructure Requirements for Virtual Environments
Virtual environments (VEs) are a broad multidisciplinary research area that includes all aspects of computer science, virtual reality, virtual worlds, teleoperation and telepresenc...
Donald P. Brutzman, Michael R. Macedonia, Michael ...
AIMS
2008
Springer
13 years 10 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...