Sciweavers

388 search results - page 28 / 78
» Communication chains and multitasking
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
CSFW
2002
IEEE
14 years 1 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
ECBS
2007
IEEE
145views Hardware» more  ECBS 2007»
14 years 45 min ago
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams
We present in this paper a new approach for the automatic verification and performance analysis of SysML activity diagrams. Since timeliness is important in the design and analysi...
Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi...
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 5 months ago
On the Queueing Behavior of Random Codes over a Gilbert-Elliot Erasure Channel
This paper considers the queueing performance of a system that transmits coded data over a time-varying erasure channel. In our model, the queue length and channel state together f...
Parimal Parag, Jean-François Chamberland, H...
INFOCOM
1990
IEEE
14 years 3 days ago
Fault Tolerance of a Class of Double-Loop Networks
This paper analyzes the fault tolerance of a class of double-loop networks referred to as forwardloop backward-hop FLBH, in which each node is connected via unidirectional links t...
Jon M. Peha, Fouad A. Tobagi