Sciweavers

22 search results - page 3 / 5
» Simple and Minimum-Cost Satisfiability for Goal Models
Sort
View
ACISP
2010
Springer
13 years 6 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
14 years 1 days ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
IJSYSC
2000
74views more  IJSYSC 2000»
13 years 5 months ago
Towards the evolutionary emergence of increasingly complex advantageous behaviours
The generation of complex entities with advantageous behaviours beyond our manual design capability requires long-term incremental evolution with continuing emergence. In this pap...
A. D. Channon, Robert I. Damper
NIPS
2000
13 years 6 months ago
The Use of MDL to Select among Computational Models of Cognition
How should we decide among competing explanations of a cognitive process given limited observations? The problem of model selection is at the heart of progress in cognitive scienc...
In Jae Myung, Mark A. Pitt, Shaobo Zhang, Vijay Ba...
PODC
1994
ACM
13 years 9 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca