Sciweavers

1180 search results - page 96 / 236
» Interaction Protocols in Agentis
Sort
View
155
Voted
VTC
2010
IEEE
171views Communications» more  VTC 2010»
15 years 2 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
140
Voted
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 11 months ago
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented ...
Carolin Lunemann, Jesper Buus Nielsen
117
Voted
ATAL
2011
Springer
14 years 4 months ago
Specifying and applying commitment-based business patterns
Recent work in communications and business modeling emphasizes a commitment-based view of interaction. By abstracting away from implementation-level details, commitments can poten...
Amit K. Chopra, Munindar P. Singh
167
Voted
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 10 months ago
Impact of Interference and Medium Access Control on Flow Allocation in Multi-Hop Wireless Networks
—The interaction between MAC protocols and interference in wireless multi-hop networks introduces extra constraints on achievable flow rates. In this paper, we formulate an optim...
Kun-da Wu, Wanjiun Liao
LICS
2007
IEEE
15 years 10 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam