Sciweavers

1612 search results - page 289 / 323
» About models of security protocols
Sort
View
IEEECGIV
2006
IEEE
15 years 3 months ago
Studying Design Collaboration in DesignWorld: An Augmented 3D Virtual World
New technological developments offer new collaborative design environments to designers. There is a great interest in these new tools however it is clear that we know very little ...
Leman Figen Gül, Mary Lou Maher
EUROMICRO
2009
IEEE
15 years 1 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas
NIPS
2003
14 years 11 months ago
Eye Movements for Reward Maximization
Recent eye tracking studies in natural tasks suggest that there is a tight link between eye movements and goal directed motor actions. However, most existing models of human eye m...
Nathan Sprague, Dana H. Ballard
TMC
2008
138views more  TMC 2008»
14 years 9 months ago
A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks
Content-based routing (CBR) provides a powerful and flexible foundation for distributed applications. Its communication model, based on implicit addressing, fosters decoupling amon...
Luca Mottola, Gianpaolo Cugola, Gian Pietro Picco
IANDC
2007
152views more  IANDC 2007»
14 years 9 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner