Sciweavers

36 search results - page 6 / 8
» Analysis of Typed Analyses of Authentication Protocols
Sort
View
CN
2004
108views more  CN 2004»
13 years 7 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
ARGMAS
2007
Springer
13 years 11 months ago
On the Benefits of Exploiting Hierarchical Goals in Bilateral Automated Negotiation
Interest-based negotiation (IBN) is a form of negotiation in which agents exchange information about their underlying goals, with a view to improving the likelihood and quality of ...
Iyad Rahwan, Philippe Pasquier, Liz Sonenberg, Fra...
CONCUR
2010
Springer
13 years 8 months ago
Buffered Communication Analysis in Distributed Multiparty Sessions
Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchron...
Pierre-Malo Deniélou, Nobuko Yoshida
ICNS
2009
IEEE
14 years 2 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
SRDS
1999
IEEE
13 years 11 months ago
On Diffusing Updates in a Byzantine Environment
We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer...
Dahlia Malkhi, Yishay Mansour, Michael K. Reiter