Sciweavers

449 search results - page 57 / 90
» Formal Modeling of Communication Protocols by Graph Transfor...
Sort
View
TAMODIA
2008
15 years 2 months ago
Information Supply Mechanisms in Ubiquitous Computing, Crisis Management and Workflow Modelling
Abstract. The successful application of ubiquitous computing in crisis management requires a thorough understanding of the mechanisms that extract information from sensors and comm...
Jurriaan van Diggelen, Robbert-Jan Beun, Rogier M....
ACISP
2009
Springer
15 years 8 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
JCS
2006
157views more  JCS 2006»
15 years 1 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
GLOBECOM
2007
IEEE
15 years 7 months ago
Colouring Link-Directional Interference Graphs in Wireless Ad Hoc Networks
—In this paper, we clarify inter-link interference in wireless ad-hoc networks by using link-directional interference graphs (l-graph). Most of the interference graphs in the lit...
Ping Chung Ng, David J. Edwards, Soung Chang Liew
CORR
2008
Springer
179views Education» more  CORR 2008»
15 years 1 months ago
Practical Automated Partial Verification of Multi-Paradigm Real-Time Models
This article introduces a fully automated verification technique that permits to analyze real-time systems described using a continuous notion of time and a mixture of operational...
Carlo A. Furia, Matteo Pradella, Matteo Rossi