Sciweavers

1128 search results - page 79 / 226
» Little Engines of Proof
Sort
View
76
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen
IOR
2010
100views more  IOR 2010»
14 years 8 months ago
Integrated Production and Outbound Distribution Scheduling: Review and Extensions
In many applications involving make-to-order or time-sensitive (e.g., perishable, seasonal) products, finished orders are often delivered to customers immediately or shortly after...
Zhi-Long Chen
CDC
2010
IEEE
167views Control Systems» more  CDC 2010»
14 years 4 months ago
Numerical methods for the optimization of nonlinear stochastic delay systems, and an application to internet regulation
The Markov chain approximation method is an effective and widely used approach for computing optimal values and controls for stochastic systems. It was extended to nonlinear (and p...
Harold J. Kushner
ESORICS
2012
Springer
13 years 2 days ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
ICSE
2007
IEEE-ACM
15 years 9 months ago
GoalDebug: A Spreadsheet Debugger for End Users
We present a spreadsheet debugger targeted at end users. Whenever the computed output of a cell is incorrect, the user can supply an expected value for a cell, which is employed b...
Robin Abraham, Martin Erwig