Sciweavers

1777 search results - page 288 / 356
» Programming Cryptographic Protocols
Sort
View
AIS
2004
Springer
14 years 2 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
IFIP
2004
Springer
14 years 2 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly a...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
IFIP
2004
Springer
14 years 2 months ago
Service Location and Multiparty Peering for Mobile Ad Hoc Communication
Abstract. Flexible personal communications may require dynamically discovering, using, and combining a number of services to support the activities of a mobile user. However, many ...
Dirk Kutscher, Jörg Ott
IFIP
2004
Springer
14 years 2 months ago
Ensuring Termination by Typability
A term terminates if all its reduction sequences are of finite length. We show four type systems that ensure termination of well-typed π-calculus processes. The systems are obtai...
Yuxin Deng, Davide Sangiorgi
AUSAI
2003
Springer
14 years 1 months ago
An eNegotiation Framework
Negotiation between two trading agents is a two-stage process. First, the agents exchange offers whilst acquiring and exchanging information. Second, they attempt to reach a mutual...
John K. Debenham