Sciweavers

2711 search results - page 520 / 543
» Stochastic Hybrid Systems: Application to Communication Netw...
Sort
View
CCS
2003
ACM
14 years 1 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
PADL
2001
Springer
14 years 1 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
UM
2001
Springer
14 years 1 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
IWAI
1999
Springer
14 years 27 days ago
Listen to Your Heart Rate: Counting the Cost of Media Quality
Networked multimedia applications, such as videoconferencing, offer great communicative opportunities. Since the financial cost of using such a service increases in line with the q...
Gillian M. Wilson, Martina Angela Sasse
EUC
2006
Springer
14 years 9 days ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom