Sciweavers

986 search results - page 84 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
INFOCOM
1997
IEEE
14 years 16 days ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
TCC
2009
Springer
116views Cryptology» more  TCC 2009»
14 years 9 months ago
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Abstract. In this paper we consider commitment schemes that are secure against concurrent man-in-the-middle (cMiM) attacks. Under such attacks, two possible notions of security for...
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
ICC
2009
IEEE
184views Communications» more  ICC 2009»
14 years 3 months ago
A 3-D Markov Chain Queueing Model of IEEE 802.11 DCF with Finite Buffer and Load
—We introduce a 3-dimensional Markov chain that integrates the IEEE 802.11 DCF contention resolution and queueing processes into one model. Important QoS measures, delay and loss...
Ren Ping Liu, Gordon Sutton, Iain B. Collings
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
ESAW
2004
Springer
14 years 2 months ago
Controlled Experimentation with Agents - Models and Implementations
The deployment of multi-agent systems demands for justified confidence into their behaviour, both with respect to correct results of computations and with respect to timeliness t...
Mathias Röhl, Adelinde Uhrmacher