Sciweavers

2314 search results - page 307 / 463
» What is a Model
Sort
View
LICS
1999
IEEE
15 years 8 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
MICCAI
1999
Springer
15 years 8 months ago
Towards a Better Comprehension of Similarity Measures Used in Medical Image Registration
While intensity-based similarity measures are increasingly used for medical image registration, they often rely on implicit assumptions regarding the physics of imaging. The motiva...
Alexis Roche, Grégoire Malandain, Nicholas ...
IPPS
1998
IEEE
15 years 8 months ago
The Timewheel Group Membership Protocol
Abstract. We describe a group membership protocol, called the timewheel group membership protocol, for a timed asynchronous distributed system. This protocol is a part of the timew...
Shivakant Mishra, Christof Fetzer, Flaviu Cristian
IPPS
1998
IEEE
15 years 8 months ago
Design and Implementation of a Parallel I/O Runtime System for Irregular Applications
In this paper we present the design, implementation and evaluation of a runtime system based on collective I/O techniques for irregular applications. We present two models, namely...
Jaechun No, Sung-Soon Park, Jesús Carretero...
LICS
1996
IEEE
15 years 8 months ago
The Theory of Hybrid Automata
Ahybrid automatonis a formalmodelfor a mixeddiscrete-continuous system. We classify hybrid automata acoording to what questions about their behavior can be answered algorithmically...
Thomas A. Henzinger