Sciweavers

279 search results - page 32 / 56
» Authentication Protocols for Personal Communication Systems
Sort
View
AGENTS
2001
Springer
14 years 15 days ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
BPM
2007
Springer
152views Business» more  BPM 2007»
13 years 12 months ago
Adaptive Workflows for Healthcare Information Systems
Current challenges in Healthcare Information Systems (HIS) include supplying patients with personalized medical information, creating means for efficient information flow between d...
Kees M. van Hee, Helen Schonenberg, Alexander Sere...
CONEXT
2009
ACM
13 years 9 months ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 12 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
MOBICOM
2004
ACM
14 years 1 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eï...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...