Sciweavers

1777 search results - page 229 / 356
» Programming Cryptographic Protocols
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
QoS Routing in Wireless Mesh Networks with Cognitive Radios
— In this paper, we study QoS routing in wireless mesh networks with cognitive radios, which involves route selection, channel allocation and scheduling. It turns out to be a har...
Roberto Hincapie, Jian Tang, Guoliang Xue, Roberto...
NIME
2001
Springer
126views Music» more  NIME 2001»
14 years 1 months ago
Problems and Prospects for Intimate Musical Control of Computers
In this paper we describe our efforts towards the development of live performance computer-based musical instrumentation. Our design criteria include initial ease of use coupled w...
David Wessel, Matthew Wright
ATAL
2003
Springer
14 years 16 days ago
An exploration of bugs and debugging in multi-agent systems
Debugging multi-agent systems, which are concurrent, distributed, and consist of complex components, is difficult, yet crucial. In earlier work we have proposed mechanisms whereby...
David Poutakidis, Lin Padgham, Michael Winikoff
ENTCS
2007
112views more  ENTCS 2007»
13 years 8 months ago
A Calculus of Global Interaction based on Session Types
This paper proposes a calculus for describing communication-centred programs and discusses its use through a formal description of several use cases from real business protocols. ...
Marco Carbone, Kohei Honda, Nobuko Yoshida
SASN
2004
ACM
14 years 2 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson