Sciweavers

325 search results - page 33 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
NOSSDAV
2009
Springer
14 years 3 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
WOWMOM
2005
ACM
111views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol
We present in this paper an analytical model that accounts for the positions of stations with respect to the Access Point (AP) while evaluating the performance of 802.11 MAC layer...
Mohammad Hossein Manshaei, Gion Reto Cantieni, Cha...
ICWS
2003
IEEE
13 years 10 months ago
Constructing Web Services out of Generic Component Compositions
Abstract. Todays information systems are built using various component models such as Enterprise Java Beans, JavaBeans, Microsoft COM+, and CORBA distributed objects. In this paper...
Johann Oberleitner, Schahram Dustdar
WORDS
2005
IEEE
14 years 2 months ago
Progressive Ranking and Composition of Web Services Using Covering Arrays
Major computer companies and government agencies are adopting Web Services (WS) technology. Web services must ensure interoperability and security, and be reliable and trustworthy...
Charles J. Colbourn, Yinong Chen, Wei-Tek Tsai
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 1 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas