Sciweavers

403 search results - page 68 / 81
» An algebra for commitment protocols
Sort
View
ICC
2007
IEEE
162views Communications» more  ICC 2007»
15 years 3 months ago
LSP and Back Up Path Setup in MPLS Networks Based on Path Criticality Index
This paper reports on a promising approach for solving problems found when Multi Protocol Label Switching (MPLS), soon to be a dominant protocol, is used in core network systems. D...
Ali Tizghadam, Alberto Leon-Garcia
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 6 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
83
Voted
WOTUG
2007
15 years 25 days ago
Modeling and Analysis of the AMBA Bus Using CSP and B
Abstract. In this paper, we present a formal model and analysis of the AMBA Advanced High-performance Bus (AHB) on-chip bus. The model is given in CSP B—an integration of the pro...
Alistair A. McEwan, Steve Schneider
BMCBI
2005
94views more  BMCBI 2005»
14 years 11 months ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...