Sciweavers

2162 search results - page 297 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
JCM
2008
81views more  JCM 2008»
14 years 10 months ago
Power Allocation for Amplify-and-Forward Cooperative Transmission Over Rayleigh-Fading Channels
Cooperative transmission has been used to achieve diversity gain through partner to create multiple independent fading channels. It has attracted lots of research attention in rece...
Lian Zhao, Zaiyi Liao
JCM
2008
73views more  JCM 2008»
14 years 10 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
JCSS
2006
56views more  JCSS 2006»
14 years 10 months ago
Determining model accuracy of network traces
Accurate network modeling is critical to the design of network protocols. Traditional modeling approaches, such as Discrete Time Markov Chains (DTMC) are limited in their ability ...
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph
ENTCS
2007
105views more  ENTCS 2007»
14 years 10 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
ENTCS
2007
158views more  ENTCS 2007»
14 years 10 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer