Sciweavers

212 search results - page 23 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
JSAC
2006
130views more  JSAC 2006»
14 years 9 months ago
Performance Preserving Topological Downscaling of Internet-Like Networks
Abstract--The Internet is a large, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...
STOC
2001
ACM
104views Algorithms» more  STOC 2001»
15 years 9 months ago
Spatial gossip and resource location protocols
The dynamic behavior of a network in which information is changing continuously over time requires robust and efficient mechanisms for keeping nodes updated about new information. ...
David Kempe, Jon M. Kleinberg, Alan J. Demers
ICWS
2004
IEEE
14 years 11 months ago
Provisioning Resilient, Adaptive Web Services-based Workflow: A Semantic Modeling Approach
Web Services are emerging technologies that enable application-to-application communication and reuse of autonomous services over the Web. Recent efforts, OWL-S, model the semanti...
Chintan Patel, Kaustubh Supekar, Yugyung Lee
ACISP
2001
Springer
15 years 2 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
SEMWEB
2004
Springer
15 years 2 months ago
Semantic Web Service Interaction Protocols: An Ontological Approach
A central requirement for achieving the vision of run-time discovery and dynamic composition of services is the provision of appropriate descriptions of the operation of a service,...
Ronald Ashri, Grit Denker, Darren Marvin, Mike Sur...