abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Agentis is a framework for building interactive multiagent applications which is based upon a model of agent interaction whose key elements are services and tasks. Central to the ...
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
In this paper, we study the performance of the cumulative Automatic Repeat reQuest (ARQ) in IEEE 802.16 networks. An analytical model is developed to investigate some important per...
Fen Hou, James She, Pin-Han Ho, Xuemin (Sherman) S...