Sciweavers

1180 search results - page 81 / 236
» Interaction Protocols in Agentis
Sort
View
JUCS
2008
143views more  JUCS 2008»
15 years 17 days ago
Consequence of Two-handed Manipulation on Speed, Precision and Perception on Spatial Input Task in 3D Modelling Applications
Abstract: We developed a free form deformation application for an immersive environment in which users can interact freely using data gloves. To ensure better comfort and performan...
Manuel Veit, Antonio Capobianco, Dominique Bechman...
91
Voted
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
15 years 9 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
INFOCOM
2005
IEEE
15 years 6 months ago
A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks
Abstract— A TCP-friendly Additive Increase and Multiplicative Decrease (AIMD) protocol is proposed to support timesensitive applications in hybrid wired/wireless networks. By ana...
Lin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan
ASIACRYPT
2008
Springer
15 years 2 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
99
Voted
SENSYS
2009
ACM
15 years 7 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...