Sciweavers

1777 search results - page 323 / 356
» Programming Cryptographic Protocols
Sort
View
IIWAS
2008
13 years 10 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
IJCAI
2007
13 years 10 months ago
Automated Design of Multistage Mechanisms
Mechanism design is the study of preference aggregation protocols that work well in the face of self-interested agents. We present the first general-purpose techniques for automa...
Tuomas Sandholm, Vincent Conitzer, Craig Boutilier
DLOG
2006
13 years 10 months ago
Model checking the basic modalities of CTL with Description Logic
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
MMNS
2004
80views Multimedia» more  MMNS 2004»
13 years 10 months ago
SIPC, a multi-function SIP user agent
Integrating multiple functions into one communication user agent can introduce many innovative communication services. For example, with networked appliance control, a user agent c...
Xiaotao Wu, Henning Schulzrinne
PARCO
2003
13 years 10 months ago
Cache Memory Behavior of Advanced PDE Solvers
Three different partial differential equation (PDE) solver kernels are analyzed in respect to cache memory performance on a simulated shared memory computer. The kernels implement...
Dan Wallin, Henrik Johansson, Sverker Holmgren