Sciweavers

670 search results - page 52 / 134
» Modeling Workflow within Distributed Systems
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 6 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
122
Voted
ENTCS
2010
84views more  ENTCS 2010»
15 years 2 months ago
Resource Modeling for Timed Creol Models
This paper describes the semantics of a timed, resource-constrained extension of the Creol modeling language. Creol is an object-oriented modeling language with a design that is s...
Rudolf Schlatte, Bernhard K. Aichernig, Andreas Gr...
ICPP
2007
IEEE
15 years 8 months ago
Parallel Algorithms for Bayesian Indoor Positioning Systems
We present two parallel algorithms and their Unified Parallel C implementations for Bayesian indoor positioning systems. Our approaches are founded on Markov Chain Monte Carlo si...
Konstantinos Kleisouris, Richard P. Martin
WSC
2007
15 years 4 months ago
Agent-model validation based on historical data
Combat, unlike many real-world processes, tends to be singular in nature. That is, there are not multiple occurrences from which to hypothesize a probability distribution model of...
Lance E. Champagne, Raymond R. Hill
122
Voted
FORMATS
2007
Springer
15 years 8 months ago
Quantitative Model Checking Revisited: Neither Decidable Nor Approximable
Abstract. Quantitative model checking computes the probability values of a given property quantifying over all possible schedulers. It turns out that maximum and minimum probabilit...
Sergio Giro, Pedro R. D'Argenio