Sciweavers

1612 search results - page 273 / 323
» About models of security protocols
Sort
View
ICAIL
2007
ACM
15 years 1 months ago
An implementation of norm-based agent negotiation
In this paper, we develop our previous outline of a multi-agent architecture for regulated information exchange in crime investigations. Interactions about information exchange be...
Pieter Dijkstra, Henry Prakken, Kees de Vey Mestda...
CAISE
2006
Springer
15 years 1 months ago
User Profile Interchange in a Service-oriented Architecture
An adaptive e-learning system needs meaningful information about the learners, the user profile, to achieve a correct content tuning for each of the students. The gathering of this...
Daniela Leal Musa, Renata de Matos Galante, Marius...
CORR
2007
Springer
120views Education» more  CORR 2007»
14 years 9 months ago
Remote laboratories: new technology and standard based architecture
E-Laboratories are important components of elearning environments, especially in scientific and technical disciplines. First widespread E-Labs consisted in proposing simulations o...
Hcene Benmohamed, Arnaud Lelevé, Patrick Pr...
MOBICOM
2004
ACM
15 years 3 months ago
Denial of service resilience in ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc ne...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
COORDINATION
2008
Springer
14 years 11 months ago
A Process Calculus for Mobile Ad Hoc Networks
We present the -calculus, a process calculus for formally modeling and reasoning about Mobile Ad Hoc Wireless Networks (MANETs) and their protocols. The -calculus naturally capture...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka