Sciweavers

1777 search results - page 242 / 356
» Programming Cryptographic Protocols
Sort
View
CCGRID
2002
IEEE
14 years 1 months ago
Latency Performance of SOAP Implementations
Abstract— This paper presents an experimental evaluation of the latency performance of several implementations of Simple Object Access Protocol (SOAP) operating over HTTP, and co...
Dan Davis, Manish Parashar
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 8 months ago
SWI-Prolog and the Web
Prolog is an excellent tool for representing and manipulating data written in formal languages as well as natural language. Its safe semantics and automatic memory management make...
Jan Wielemaker, Zhisheng Huang, Lourens van der Me...
IJAOSE
2007
82views more  IJAOSE 2007»
13 years 8 months ago
West2East: exploiting WEb Service Technologies to Engineer Agent-based SofTware
This paper describes West2East, a Computer-Aided Agent-Oriented Software Engineering toolkit aimed at supporting the implementation of multiagent systems. West2East exploits langua...
Giovanni Casella, Viviana Mascardi
GLOBECOM
2010
IEEE
13 years 6 months ago
Graph-Based Optimization for Relay-Assisted Bidirectional Cellular Networks
This paper considers a relay-assisted bidirectional cellular network where the base station (BS) communicates with each mobile station (MS) using orthogonal frequency-division mult...
Yuan Liu, Meixia Tao
ESORICS
2009
Springer
14 years 9 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...