Sciweavers

1777 search results - page 317 / 356
» Programming Cryptographic Protocols
Sort
View
LICS
2003
IEEE
14 years 1 months ago
Model checking for probability and time: from theory to practice
Probability features increasingly often in software and hardware systems: it is used in distributed co-ordination and routing problems, to model fault-tolerance and performance, a...
Marta Z. Kwiatkowska
BIRTHDAY
2003
Springer
14 years 1 months ago
Bounded Fairness
Abstract. Bounded fairness is a stronger notion than ordinary eventuality-based fairness, one that guarantees occurrence of an event within a fixed number of occurrences of anothe...
Nachum Dershowitz, D. N. Jayasimha, Seungjoon Park
CP
2003
Springer
14 years 1 months ago
Automated Mechanism Design: A New Application Area for Search Algorithms
Mechanism design is the art of designing the rules of the game (aka. mechanism) so that a desirable outcome (according to a given objective) is reached despite the fact that each a...
Tuomas Sandholm
HUMAN
2003
Springer
14 years 1 months ago
A Framework of Winner Determination Algorithms for Internet Auctions
Auctions have become popular in conducting trade negotiations on the Internet. The design of new auction formats and other negotiation protocols has become an important topic for r...
Juhnyoung Lee, Sang-goo Lee, Suekyung Lee
IFIP
2003
Springer
14 years 1 months ago
JMS on Mobile Ad Hoc Networks
The Java Message Service (JMS) provides a standard asynchronous messaging API, which simplifies the construction of loosely coupled, distributed applications. This paper describes ...
Einar Vollset, David B. Ingham, Paul D. Ezhilchelv...