Sciweavers

729 search results - page 118 / 146
» Communicating Evolving Algebras
Sort
View
ISPEC
2010
Springer
13 years 9 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CONEXT
2008
ACM
13 years 9 months ago
CoreLab: an emerging network testbed employing hosted virtual machine monitor
Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a n...
Akihiro Nakao, Ryota Ozaki, Yuji Nishida
ESOP
2008
Springer
13 years 9 months ago
Open Bisimulation for the Concurrent Constraint Pi-Calculus
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Maria Grazia Buscemi, Ugo Montanari
ECSCW
2007
13 years 9 months ago
A safe space to vent: Conciliation and conflict in distributed teams
: This paper considers the nature of conflict in relation to the environments within which distributed teams cooperate. Effective conflict management can bring great benefits to di...
Matt Billings, Leon Adam Watts
WICON
2008
13 years 9 months ago
Efficient XML usage within wireless sensor networks
Integrating wireless sensor networks in heterogeneous networks is a complex task. A reason is the absence of a standardized data exchange format that is supported in all participa...
Nils Hoeller, Christoph Reinke, Jana Neumann, Sven...