Sciweavers

46 search results - page 9 / 10
» An execution scheme for interactive problem-solving in concu...
Sort
View
CCS
2004
ACM
13 years 10 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ATAL
2009
Springer
13 years 11 months ago
Reasoning intra-dependency in commitments for robust scheduling
Commitment-modeled protocols enable flexible and robust interactions among agents. However, existing work has focused on features and capabilities of protocols without considerin...
Mingzhong Wang, Kotagiri Ramamohanarao, Jinjun Che...
EMSOFT
2004
Springer
13 years 10 months ago
Reactive process networks
Data flow process networks are a good model of computation for streaming multimedia applications incorporating audio, video and/or graphics streams. Process networks are concurre...
Marc Geilen, Twan Basten
IJCSA
2006
95views more  IJCSA 2006»
13 years 5 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
WOA
2000
13 years 6 months ago
Implementing Autonomous Reactive Agents by Using Active Objects
This paper briefly outlines the main characteristics of an ongoing research aimed at developing a support library for implementing systems based on autonomous agents. The library ...
Giuliano Armano, Eloisa Vargiu