Sciweavers

1180 search results - page 148 / 236
» Interaction Protocols in Agentis
Sort
View
FUIN
2006
111views more  FUIN 2006»
15 years 25 days ago
Typing the Behavior of Software Components using Session Types
This paper proposes the use of session types to extend with behavioural information the simple descriptions usually provided by software component interfaces. We show how session t...
Antonio Vallecillo, Vasco Thudichum Vasconcelos, A...
190
Voted
POPL
2002
ACM
16 years 1 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...
117
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 22 days ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
98
Voted
MOBIHOC
2005
ACM
16 years 12 days ago
TCP over multihop 802.11 networks: issues and performance enhancement
Analyzing TCP operation over 802.11 multihop ad hoc networks involves a cross-layer study. In this work, we investigate the effect of congestion and MAC contention on the interact...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 7 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...