Sciweavers

670 search results - page 52 / 134
» Modeling Workflow within Distributed Systems
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 8 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
ENTCS
2010
84views more  ENTCS 2010»
15 years 4 months ago
Resource Modeling for Timed Creol Models
This paper describes the semantics of a timed, resource-constrained extension of the Creol modeling language. Creol is an object-oriented modeling language with a design that is s...
Rudolf Schlatte, Bernhard K. Aichernig, Andreas Gr...
ICPP
2007
IEEE
15 years 11 months ago
Parallel Algorithms for Bayesian Indoor Positioning Systems
We present two parallel algorithms and their Unified Parallel C implementations for Bayesian indoor positioning systems. Our approaches are founded on Markov Chain Monte Carlo si...
Konstantinos Kleisouris, Richard P. Martin
WSC
2007
15 years 7 months ago
Agent-model validation based on historical data
Combat, unlike many real-world processes, tends to be singular in nature. That is, there are not multiple occurrences from which to hypothesize a probability distribution model of...
Lance E. Champagne, Raymond R. Hill
137
Voted
FORMATS
2007
Springer
15 years 10 months ago
Quantitative Model Checking Revisited: Neither Decidable Nor Approximable
Abstract. Quantitative model checking computes the probability values of a given property quantifying over all possible schedulers. It turns out that maximum and minimum probabilit...
Sergio Giro, Pedro R. D'Argenio