Sciweavers

3238 search results - page 460 / 648
» Not Enough Points Is Enough
Sort
View
BELL
2000
107views more  BELL 2000»
13 years 10 months ago
Automating software feature verification
A significant part of the call processing software for Lucent's new PathStar access server [FSW98] was checked with automated formal verification techniques. The verification...
Gerard J. Holzmann, Margaret H. Smith
CCR
2000
101views more  CCR 2000»
13 years 10 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
CCR
2002
133views more  CCR 2002»
13 years 10 months ago
Crossover scaling effects in aggregated TCP traffic with congestion losses
We critically examine the claims that TCP congestion control contributes to the observed self-similar traffic rate correlations. A simulation model is designed to analyze aggregat...
Michael Liljenstam, Andrew T. Ogielski
COMCOM
2002
86views more  COMCOM 2002»
13 years 10 months ago
The potential costs and benefits of long-term prefetching for content distribution
This paper examines the costs and potential benefits of long-term prefetching for content distribution. In traditional short-term prefetching, caches use recent access history to ...
Arun Venkataramani, Praveen Yalagandula, Ravi Kokk...
CORR
2002
Springer
120views Education» more  CORR 2002»
13 years 10 months ago
A Comparison of Different Cognitive Paradigms Using Simple Animats in a Virtual Laboratory, with Implications to the Notion of C
In this thesis I present a virtual laboratory which implements five different models for controlling animats: a rule-based system, a behaviour-based system, a concept-based system...
Carlos Gershenson