Sciweavers

1777 search results - page 279 / 356
» Programming Cryptographic Protocols
Sort
View
EUROMICRO
2007
IEEE
14 years 3 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
ICC
2007
IEEE
14 years 3 months ago
Inter-Domain QoS Routing with Virtual Trunks
— This paper addresses the problem of inter-domain QoS routing. We propose a solution based on virtual-trunk type aggregates corresponding to Service Level Agreements (SLA) for d...
Rui Prior, Susana Sargento
ICNP
2007
IEEE
14 years 3 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
OTM
2007
Springer
14 years 2 months ago
Implementing a State-Based Application Using Web Objects in XML
In this paper we introduce Web Objects in XML (WOX) as a web protocol for distributed objects, which uses HTTP as its transport protocol and XML as its format representation. It al...
Carlos R. Jaimez González, Simon M. Lucas
PRIMA
2007
Springer
14 years 2 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida