Sciweavers

1180 search results - page 69 / 236
» Interaction Protocols in Agentis
Sort
View
ICIP
2006
IEEE
16 years 2 months ago
Design of a Transmission Protocol for a CVE
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...
106
Voted
IJWET
2006
89views more  IJWET 2006»
15 years 17 days ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
PERCOM
2007
ACM
16 years 5 days ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...
83
Voted
ICC
2009
IEEE
135views Communications» more  ICC 2009»
15 years 7 months ago
A Polite Cross-Layer Protocol for Contention-Based Home Power-Line Communications
—In typical home power-line communication (PLC) networks using contention-based access methods, providing Quality-of-service (QoS) to high-priority users often comes at the expen...
Aakanksha Chowdhery, Sumanth Jagannathan, John M. ...
98
Voted
ESORICS
2007
Springer
15 years 6 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...