Sciweavers

1076 search results - page 204 / 216
» Operations on proofs and labels
Sort
View
LICS
2006
IEEE
14 years 1 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
MOBICOM
2006
ACM
14 years 1 months ago
Coverage and connectivity in three-dimensional networks
Although most wireless terrestrial networks are based on twodimensional (2D) design, in reality, such networks operate in threedimensions (3D). Since most often the size (i.e., th...
S. M. Nazrul Alam, Zygmunt J. Haas
SACMAT
2006
ACM
14 years 1 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
ICDCS
2005
IEEE
14 years 1 months ago
The Impossibility of Boosting Distributed Service Resilience
We prove two theorems saying that no distributed system in which processes coordinate using reliable registers and -resilient services can solve the consensus problem in the prese...
Paul C. Attie, Rachid Guerraoui, Petr Kouznetsov, ...
SPAA
2005
ACM
14 years 1 months ago
Randomization does not reduce the average delay in parallel packet switches
Switching cells in parallel is a common approach to build switches with very high external line rate and a large number of ports. A prime example is the parallel packet switch (in...
Hagit Attiya, David Hay