Sciweavers

2968 search results - page 228 / 594
» Network Programming Using PLAN
Sort
View
PADL
2001
Springer
15 years 7 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
141
Voted
SAC
2008
ACM
15 years 2 months ago
Improving denial of service resistance using dynamic local adaptations
We improve the resistance of gossip-based multicast to (Distributed) Denial of Service (DoS) attacks using dynamic local adaptations at each node. Each node estimates the current ...
Gal Badishi, Idit Keidar
123
Voted
AAAI
2008
15 years 5 months ago
H-DPOP: Using Hard Constraints for Search Space Pruning in DCOP
In distributed constraint optimization problems, dynamic programming methods have been recently proposed (e.g. DPOP). In dynamic programming many valuations are grouped together i...
Akshat Kumar, Adrian Petcu, Boi Faltings
161
Voted
DBPL
1995
Springer
144views Database» more  DBPL 1995»
15 years 7 months ago
An Algebraic Framework for Physical OODB Design
Physical design for object-oriented databases is still in its infancy. Implementation decisions often intrude into the conceptual design (such as inverse links and object decompos...
Leonidas Fegaras, David Maier
118
Voted
ETFA
2008
IEEE
15 years 10 months ago
Automatic generation of bond graph models of process plants
This paper presents an application for the automatic generation of Bond Graph models. The basis for this automated creation is a modified plant model in the XML-format according t...
Sebastian Beez, Alexander Fay, Nina F. Thornhill