Sciweavers

1180 search results - page 39 / 236
» Interaction Protocols in Agentis
Sort
View
JSW
2008
122views more  JSW 2008»
13 years 11 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
EMISA
2005
Springer
14 years 4 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle
INTERNET
2006
156views more  INTERNET 2006»
13 years 11 months ago
Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management
Web services provide abstractions for simplifying integration at lower levels of the interaction stacks, they don't yet help simplify integration at higher abstraction levels ...
Boualem Benatallah, Fabio Casati, Farouk Toumani, ...
MM
2010
ACM
148views Multimedia» more  MM 2010»
13 years 11 months ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang
ECOOP
2007
Springer
14 years 5 months ago
Towards correct evolution of components using VPA-based aspects
Abstract. Interaction protocols are a popular means to construct correct component-based systems. Aspects that modify such protocols are interesting in this context because they su...
Dong Ha Nguyen, Mario Südholt