Sciweavers

793 search results - page 78 / 159
» Protocol Modeling with Model Program Composition
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
PRIMA
2007
Springer
14 years 3 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida
CCS
2008
ACM
13 years 11 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
IFIP
2003
Springer
14 years 2 months ago
A Service Discovery Model for Wireless and Mobile Terminals in IPv6
As the mobility and the number of affordable, powerful, and highly portable devices becoming networked increases, so will the amount of networked services offered, managed and disc...
Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harj...
SIGSOFT
2007
ACM
14 years 9 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska