Sciweavers

1490 search results - page 292 / 298
» The Logic of Authentication Protocols
Sort
View
ADHOC
2004
134views more  ADHOC 2004»
13 years 7 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka
COMPUTER
2002
121views more  COMPUTER 2002»
13 years 7 months ago
The Interspace: Concept Navigation Across Distributed Communities
ectly support interaction with abstraction. Using technologies that go beyond searching individual repositories to analyzing and correlating knowledge across multiple sources and s...
Bruce R. Schatz
INTERNET
2002
175views more  INTERNET 2002»
13 years 7 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
WWW
2003
ACM
14 years 8 months ago
Haystack: A Platform for Authoring End User Semantic Web Applications
The Semantic Web promises to open innumerable opportunities for automation and information retrieval by standardizing the protocols for metadata exchange. However, just as the succ...
Dennis Quan, David Huynh, David R. Karger
POPL
2009
ACM
14 years 8 months ago
A calculus of atomic actions
We present a proof calculus and method for the static verification of assertions and procedure specifications in shared-memory concurrent programs. The key idea in our approach is...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran