Sciweavers

9006 search results - page 1530 / 1802
» Modeling Software
Sort
View
FSTTCS
2003
Springer
15 years 9 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
ICFEM
2003
Springer
15 years 9 months ago
Generic Interacting State Machines and Their Instantiation with Dynamic Features
Interacting State Machines (ISMs) are used to model reactive systems and to express and verify their properties. They can be seen both as automata exchanging messages simultaneousl...
David von Oheimb, Volkmar Lotz
IFIP
2003
Springer
15 years 9 months ago
Power-Saving in Wi-Fi Hotspots: An Analytical Study
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the scarcity of mobile-device energetic resources. Both har...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
DSN
2002
IEEE
15 years 9 months ago
Reliability and Availability Analysis for the JPL Remote Exploration and Experimentation System
The NASA Remote Exploration and Experimentation (REE) Project, managed by the Jet Propulsion Laboratory, has the vision of bringing commercial supercomputing technology into space...
Dong Chen, Selvamuthu Dharmaraja, Dongyan Chen, Le...
IPPS
2002
IEEE
15 years 9 months ago
Toward a Framework for Preparing and Executing Adaptive Grid Programs
This paper describes the program execution framework being developed by the Grid Application Development Software (GrADS) Project. The goal of this framework is to provide good re...
Ken Kennedy, Mark Mazina, John M. Mellor-Crummey, ...
« Prev « First page 1530 / 1802 Last » Next »