Sciweavers

3318 search results - page 84 / 664
» The Weak Instance Model
Sort
View
AINA
2004
IEEE
15 years 6 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
108
Voted
ENTCS
2007
86views more  ENTCS 2007»
15 years 2 months ago
On the Non-sequential Nature of Domain Models of Real-number Computation
Escard´o, Hofmann and Streicher showed that real-number computations in the interval-domain environment are inherently parallel, in the sense that they imply the presence of weak...
Thomas Anberrée
125
Voted
GECON
2009
Springer
96views Business» more  GECON 2009»
15 years 6 months ago
A QoS-Based Selection Mechanism Exploiting Business Relationships in Workflows
This paper deals with the problem of selecting service instances to execute workflow processes by not only taking into consideration Quality of Service (QoS) constraints, posed by ...
Dimosthenis Kyriazis, Konstantinos Tserpes, Ioanni...
130
Voted
CAEPIA
2009
Springer
15 years 3 months ago
Empirical Hardness for Mixed Auctions
Mixed Multi-Unit Combinatorial Auctions (MMUCAs) offer a high potential to be employed for the automated assembly of supply chains of agents. However, little is known about the fac...
Pablo Almajano, Jesús Cerquides, Juan A. Ro...
127
Voted
AISC
2008
Springer
15 years 4 months ago
Strategies for Solving SAT in Grids by Randomized Search
Grid computing offers a promising approach to solving challenging computational problems in an environment consisting of a large number of easily accessible resources. In this pape...
Antti Eero Johannes Hyvärinen, Tommi A. Juntt...