Sciweavers

1490 search results - page 245 / 298
» The Logic of Authentication Protocols
Sort
View
FSTTCS
2007
Springer
14 years 22 days ago
Efficient and Expressive Tree Filters
Abstract. We investigate streaming evaluation of filters on XML documents, evaluated both at the root node and at an arbitrary node. Motivated by applications in protocol processin...
Michael Benedikt, Alan Jeffrey
ACSAC
2001
IEEE
14 years 15 days ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
TMC
2012
11 years 11 months ago
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks
—This paper studies video multicasting in large scale areas using wireless mesh networks. The focus is on the use of Internet access gateways that allow a choice of alternative r...
Wanqing Tu, Cormac J. Sreenan, Chun Tung Chou, Arc...
LCN
2005
IEEE
14 years 2 months ago
Performance of a Bluetooth IP Network for Streaming High Quality Audio
An ’Internet Protocol’ (IP) network established over Bluetooth affords higher practical throughput compared to the ‘Synchronous Connection Oriented’ (SCO) physical link al...
Wan Kin Loh, Salil S. Kanhere, Deep Sen
FORMATS
2004
Springer
14 years 2 months ago
Symbolic Model Checking for Probabilistic Timed Automata
Probabilistic timed automata are timed automata extended with discrete probability distributions, and can be used to model timed randomised protocols or faulttolerant systems. We ...
Marta Z. Kwiatkowska, Gethin Norman, Jeremy Sprost...