Sciweavers

253 search results - page 38 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
AINA
2007
IEEE
15 years 7 months ago
Collision prevention using group communication for asynchronous cooperative mobile robots
The paper presents a fail-safe mobility management and a collision prevention platform for a group of asynchronous cooperative mobile robots. The fail-safe platform consists of a ...
Rami Yared, Xavier Défago, Matthias Wiesman...
TITB
2010
181views Education» more  TITB 2010»
14 years 9 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
RTSS
1999
IEEE
15 years 7 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
TAOSD
2010
15 years 1 months ago
Aspect-Oriented Development Using Protocol Modeling
Abstract. The aim of this paper is to explore the modeling of crosscutavioral abstractions. We argue that behavioral aspects can be a particular kind of more general behavioral abs...
Ashley T. McNeile, Ella E. Roubtsova
AINA
2009
IEEE
15 years 10 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu