Sciweavers

1186 search results - page 33 / 238
» Goal-Oriented Interaction Protocols
Sort
View
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 5 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
EEE
2005
IEEE
14 years 3 months ago
Composition of Negotiation Protocols for E-Commerce Applications
A company doing e-business needs capabilities to negotiate electronically the parameters of its deals in order to fully utilize the potential of the Information and Communication ...
Nikolay K. Diakov, Zlatko Zlatev, Stanislav Pokrae...
ESAW
2003
Springer
14 years 3 months ago
Competent Agents and Customising Protocols
Abstract. In open agent societies, communication protocols and strategies cannot be assumed to always match perfectly, because they are typically specified by different designers...
Ulrich Endriss, Wenjin Lu, Nicolas Maudet, Kostas ...
JSW
2008
122views more  JSW 2008»
13 years 9 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
EMISA
2005
Springer
14 years 3 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle