Sciweavers

1490 search results - page 261 / 298
» The Logic of Authentication Protocols
Sort
View
ISSTA
2000
ACM
14 years 1 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
IDMS
1999
Springer
143views Multimedia» more  IDMS 1999»
14 years 1 months ago
Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF
In the context of distributed multimedia applications involving multicast to a large number of users, a single quality of service level may not be appropriate for all participants....
Gregor von Bochmann, Zhen Yang
MM
1998
ACM
79views Multimedia» more  MM 1998»
14 years 1 months ago
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation
The ability to trace multicast paths is currently available in the Internet by means of IGMP MTRACE packets. We introduce Tracer, the rst protocol that organizes the receivers of ...
Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-...
TABLEAUX
1998
Springer
14 years 1 months ago
Model Checking: Historical Perspective and Example (Extended Abstract)
ple (Extended Abstract) Edmund M. Clarke and Sergey Berezin Carnegie Mellon University -- USA Model checking is an automatic verification technique for finite state concurrent syst...
Edmund M. Clarke, Sergey Berezin
PADS
1997
ACM
14 years 29 days ago
Optimistic Distributed Simulation Based on Transitive Dependency Tracking
In traditional optimistic distributed simulation protocols, a logical process(LP) receiving a straggler rolls back and sends out anti-messages. Receiver of an anti-message may als...
Om P. Damani, Yi-Min Wang, Vijay K. Garg