Sciweavers

1186 search results - page 77 / 238
» Goal-Oriented Interaction Protocols
Sort
View
JUCS
2008
143views more  JUCS 2008»
13 years 10 months ago
Consequence of Two-handed Manipulation on Speed, Precision and Perception on Spatial Input Task in 3D Modelling Applications
Abstract: We developed a free form deformation application for an immersive environment in which users can interact freely using data gloves. To ensure better comfort and performan...
Manuel Veit, Antonio Capobianco, Dominique Bechman...
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
14 years 6 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
INFOCOM
2005
IEEE
14 years 3 months ago
A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks
Abstract— A TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) protocol is proposed to support timesensitive applications in hybrid wired/wireless networks. By ana...
Lin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan
ASIACRYPT
2008
Springer
14 years 16 hour ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
SENSYS
2009
ACM
14 years 4 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...