Sciweavers

1404 search results - page 153 / 281
» Complexity of admissible rules
Sort
View
IPCCC
2005
IEEE
14 years 2 months ago
Real time agreement protocol and resource pre-reservation for wireless system
The third generation of mobile networks aims to offer services diversified to users, while guaranteeing acceptable QoS. This results in the setting up of strategies of increasingl...
Sonia Ben Rejeb, Sami Tabbane, Zièd Choukai...
ANCS
2005
ACM
14 years 2 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
CCS
2003
ACM
14 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
ICANN
2009
Springer
14 years 1 months ago
Computing with Probabilistic Cellular Automata
Abstract. We investigate the computational capabilities of probabilistic cellular automata by means of the density classification problem. We find that a specific probabilistic ...
Martin Schüle, Thomas Ott, Ruedi Stoop
TOOLS
2000
IEEE
14 years 1 months ago
More Meaningful UML Models
UML is widely used today for modelling complex systems. However, the tools support capabilities for UML is limited, partially due to its lack of precise semantics. There are some ...
Ileana Ober