Sciweavers

15375 search results - page 123 / 3075
» cans 2008
Sort
View
COMCOM
2000
97views more  COMCOM 2000»
13 years 7 months ago
Verification of security protocols using LOTOS-method and application
We explain how the formal language LOTOS can be used to specify security protocols and cryptographic operations. We describe how security properties can be modelled as safety prop...
Guy Leduc, François Germeau
COMCOM
2002
79views more  COMCOM 2002»
13 years 7 months ago
A probabilistic priority scheduling discipline for multi-service networks
This paper proposes a novel scheduling discipline for service differentiation in multi-service networks, which is referred to as the Probabilistic Priority (PP) discipline. PP is ...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
DEBU
2002
116views more  DEBU 2002»
13 years 7 months ago
The Role of Web Services in Information Search
State-of-the-art Web search engines are inherently limited in their abilities to search information in Deep Web beyond portals. This paper discusses how Web services and Semantic-...
Jens Graupmann, Gerhard Weikum
SIAMCO
2000
137views more  SIAMCO 2000»
13 years 7 months ago
On a Class of Diffeomorphic Matching Problems in One Dimension
We study a class of functional which can be used for matching objects which can be represented as mappings from a fixed interval, I, to some "feature space." This class o...
Alain Trouvé, Laurent Younes
CCR
1999
110views more  CCR 1999»
13 years 7 months ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell