Sciweavers

598 search results - page 29 / 120
» Aspect-Oriented Development Using Protocol Modeling
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 2 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Analysis of bittorrent-like protocols for on-demand stored media streaming
This paper develops analytic models that characterize the behavior of on-demand stored media content delivery using BitTorrent-like protocols. The models capture the effects of di...
Nadim Parvez, Carey L. Williamson, Anirban Mahanti...
MOBIHOC
2003
ACM
14 years 9 months ago
PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols
We develop a detailed approach to study how mobilityimpacts the performance of reactive MANET routing protocols. In particular we examine how the statistics of path durations inclu...
Narayanan Sadagopan, Fan Bai, Bhaskar Krishnamacha...
AAMAS
2007
Springer
13 years 10 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh
ATAL
2004
Springer
14 years 3 months ago
Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction
In this paper, we investigate a model of a combinatorial, procurement multi-attribute auction, in which each sales item is defined by several attributes called quality, the buyer...
Takayuki Suyama, Makoto Yokoo