Sciweavers

1777 search results - page 292 / 356
» Programming Cryptographic Protocols
Sort
View
AIPS
2006
13 years 10 months ago
Run-Time Monitoring of the Execution of Plans for Web Service Composition
While a lot of work has been done on the problem of the automated generation of plans that compose web services, the problem of monitoring their execution has still to be investig...
Fabio Barbon, Paolo Traverso, Marco Pistore, Miche...
CADUI
2004
13 years 10 months ago
A Lightweight Experiment Management System for Handheld Computers
: This paper describes a system that helps HCI practitioners and researchers manage and conduct experiments involving context-sensitive handheld applications, particularly related ...
Philip D. Gray, Joy Goodman, James Macleod
FECS
2006
80views Education» more  FECS 2006»
13 years 10 months ago
A Redesigned Undergraduate Data Communication and Networking Course Incorporating Theory and Practice
Data Communication and Computer Networking is a traditional undergraduate CS course. Classic teaching focuses on communication protocol and algorithm analysis, plus socket programm...
Ziping Liu
ENTCS
2006
154views more  ENTCS 2006»
13 years 8 months ago
PMaude: Rewrite-based Specification Language for Probabilistic Object Systems
We introduce a rewrite-based specification language for modelling probabilistic concurrent and distributed systems. The language, based on PMaude, has both a rigorous formal basis...
Gul A. Agha, José Meseguer, Koushik Sen
TSP
2008
107views more  TSP 2008»
13 years 8 months ago
Opportunistic Spectrum Access via Periodic Channel Sensing
The problem of opportunistic access of parallel channels occupied by primary users is considered. Under a continuous-time Markov chain modeling of the channel occupancy by the prim...
Qing Zhao, Stefan Geirhofer, Lang Tong, Brian M. S...