Sciweavers

458 search results - page 45 / 92
» Designing and executing protocols using the event calculus
Sort
View
CCS
2008
ACM
13 years 11 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
DSONLINE
2006
108views more  DSONLINE 2006»
13 years 9 months ago
Middleware for Protocol-Based Coordination in Mobile Applications
We propose extending these middleware approaches with suitable abstractions to better support protocolbased interaction in mobile applications. To test our approach, we created Obj...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
AINA
2008
IEEE
14 years 3 months ago
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs
Applications that rely on the publish-subscribe model (such as those dedicated to news or event distribution) require a communication model whereby information can flow towards a...
Julien Haillot, Frédéric Guidec
ICEBE
2009
IEEE
127views Business» more  ICEBE 2009»
14 years 3 months ago
Simulation-Based Evaluation of Workflow Escalation Strategies
Workflows in the service industry sometimes need to deal with multi-fold increases in customer demand within a short period of time. Such spikes in service demand may be caused by...
Ka-Leong Chan, Yain-Whar Si, Marlon Dumas
OTM
2007
Springer
14 years 3 months ago
Decentralised Commitment for Optimistic Semantic Replication
Abstract. We study large-scale distributed cooperative systems that use optimistic replication. We represent a system as a graph of actions (operations) connected by edges that rei...
Pierre Sutra, João Barreto, Marc Shapiro