Sciweavers

1490 search results - page 247 / 298
» The Logic of Authentication Protocols
Sort
View
DAC
1996
ACM
14 years 29 days ago
Integrating Formal Verification Methods with A Conventional Project Design Flow
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
Ásgeir Th. Eiríksson
IJCAI
2007
13 years 10 months ago
Learning to Count by Think Aloud Imitation
Although necessary, learning to discover new solutions is often long and difficult, even for supposedly simple tasks such as counting. On the other hand, learning by imitation pr...
Laurent Orseau
SERP
2003
13 years 10 months ago
A Software Library for SyncML Server Applications
The SyncML, the standard synchronization protocol, supports the synchronization of various application services such as an address book, a calendar. Even with this standard protoc...
JiYeon Lee, Hoon Choi
ICNP
2009
IEEE
14 years 3 months ago
Better by a HAIR: Hardware-Amenable Internet Routing
—Routing protocols are implemented in the form of software running on a general-purpose microprocessor. However, conventional software-based router architectures face significan...
Firat Kiyak, Brent Mochizuki, Eric Keller, Matthew...
HUC
2007
Springer
14 years 3 months ago
Haggle: Seamless Networking for Mobile Applications
This paper presents Haggle, an architecture for mobile devices that enables seamless network connectivity and application functionality in dynamic mobile environments. Current appl...
Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal...