Sciweavers

1490 search results - page 262 / 298
» The Logic of Authentication Protocols
Sort
View
ATAL
2006
Springer
14 years 16 days ago
Run-time model checking of interaction and deontic models for multi-agent systems
This paper is concerned with the problem of obtaining predictable interactions between groups of agents in open environments when individual agents do not expose their bdi logic. ...
Nardine Osman, David Robertson, Christopher Walton
ECOWS
2006
Springer
14 years 14 days ago
Formal Modelling and Verification of an Asynchronous Extension of SOAP
Current web services are largely based on a synchronous request-response model that uses the Simple Object Access Protocol SOAP. Next-generation telecommunication networks, on the...
Maurice H. ter Beek, Stefania Gnesi, Franco Mazzan...
CORR
2008
Springer
179views Education» more  CORR 2008»
13 years 9 months ago
Practical Automated Partial Verification of Multi-Paradigm Real-Time Models
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...
Carlo A. Furia, Matteo Pradella, Matteo Rossi
IAJIT
2007
146views more  IAJIT 2007»
13 years 8 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
CN
1998
59views more  CN 1998»
13 years 8 months ago
Daisy: A Scalable All-Optical Packet Network with Multifiber Ring Topology
This paper presents Daisy, a scalable all-optical packet network where each node is equipped with one wavelength-tunable transmitter and one fixed-wavelength receiver. Network sca...
Marco Ajmone Marsan, Andrea Fumagalli, Emilio Leon...