Sciweavers

1123 search results - page 59 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
DALT
2005
Springer
15 years 5 months ago
An Intensional Programming Approach to Multi-agent Coordination in a Distributed Network of Agents
We explore the suitability of Intensional Programming Paradigm for providing a programming model for coordinated problem solving in a multi-agent systems. We extend our previous wo...
Kaiyu Wan, Vasu S. Alagar
ECS
2006
89views more  ECS 2006»
14 years 12 months ago
Dynamic Decision Protocol For Adhoc Network
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Mohamed Ben Othman
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 6 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
ENTCS
2007
129views more  ENTCS 2007»
14 years 11 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
ADHOC
2007
144views more  ADHOC 2007»
14 years 12 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac