Sciweavers

3318 search results - page 84 / 664
» The Weak Instance Model
Sort
View
AINA
2004
IEEE
13 years 11 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
ENTCS
2007
86views more  ENTCS 2007»
13 years 8 months ago
On the Non-sequential Nature of Domain Models of Real-number Computation
Escard´o, Hofmann and Streicher showed that real-number computations in the interval-domain environment are inherently parallel, in the sense that they imply the presence of weak...
Thomas Anberrée
GECON
2009
Springer
96views Business» more  GECON 2009»
13 years 11 months ago
A QoS-Based Selection Mechanism Exploiting Business Relationships in Workflows
This paper deals with the problem of selecting service instances to execute workflow processes by not only taking into consideration Quality of Service (QoS) constraints, posed by ...
Dimosthenis Kyriazis, Konstantinos Tserpes, Ioanni...
CAEPIA
2009
Springer
13 years 9 months ago
Empirical Hardness for Mixed Auctions
Mixed Multi-Unit Combinatorial Auctions (MMUCAs) offer a high potential to be employed for the automated assembly of supply chains of agents. However, little is known about the fac...
Pablo Almajano, Jesús Cerquides, Juan A. Ro...
AISC
2008
Springer
13 years 10 months ago
Strategies for Solving SAT in Grids by Randomized Search
Grid computing offers a promising approach to solving challenging computational problems in an environment consisting of a large number of easily accessible resources. In this pape...
Antti Eero Johannes Hyvärinen, Tommi A. Juntt...