Sciweavers

3938 search results - page 92 / 788
» Interactive Protocols on the Reals
Sort
View
105
Voted
DSN
2009
IEEE
15 years 7 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
105
Voted
WWW
2007
ACM
16 years 1 months ago
Semi-automated adaptation of service interactions
In today's Web, many functionality-wise similar Web services are offered through heterogeneous interfaces (operation definitions) and business protocols (ordering constraints...
Hamid R. Motahari Nezhad, Boualem Benatallah, Axel...
ATC
2010
Springer
14 years 11 months ago
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
Co-Space refers to interactive virtual environment modelled after the real world we are situated in. Through realistic 3D modelling and animation technologies, Co-Space simulates t...
Ah-Hwee Tan, Yilin Kang
97
Voted
EEE
2005
IEEE
15 years 6 months ago
Composition of Negotiation Protocols for E-Commerce Applications
A company doing e-business needs capabilities to negotiate electronically the parameters of its deals in order to fully utilize the potential of the Information and Communication ...
Nikolay K. Diakov, Zlatko Zlatev, Stanislav Pokrae...
ESAW
2003
Springer
15 years 5 months ago
Competent Agents and Customising Protocols
Abstract. In open agent societies, communication protocols and strategies cannot be assumed to always match perfectly, because they are typically specified by different designers...
Ulrich Endriss, Wenjin Lu, Nicolas Maudet, Kostas ...