Sciweavers

483 search results - page 4 / 97
» Patterns of Protocols
Sort
View
BPM
2005
Springer
108views Business» more  BPM 2005»
14 years 1 months ago
From RosettaNet PIPs to BPEL Processes: A Three Level Approach for Business Protocols
Abstract. Business protocols in n-party interactions often require centralized protocol design but decentralized execution without the intervention of the designing party. In this ...
Rania Khalaf
IEEEARES
2006
IEEE
14 years 1 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
CAINE
2003
13 years 9 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
ANSS
1995
IEEE
13 years 11 months ago
Algorithms for categorizing multiprocessor communication under invalidate and update-based coherence protocols
In this paper we present simulation algorithmsthat characterize the main sources of communication generated by parallel applications under both invalidate and updatebased cache co...
Ricardo Bianchini, Leonidas I. Kontothanassis
BMCBI
2010
155views more  BMCBI 2010»
13 years 5 months ago
BrEPS: a flexible and automatic protocol to compute enzyme-specific sequence profiles for functional annotation
Background: Models for the simulation of metabolic networks require the accurate prediction of enzyme function. Based on a genomic sequence, enzymatic functions of gene products a...
Constantin Bannert, A. Welfle, C. aus dem Spring, ...