Sciweavers

5615 search results - page 91 / 1123
» On the Computational Capabilities of Several Models
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 10 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
ICNS
2007
IEEE
15 years 4 months ago
IGMPS, a New Tool for Estimating End-to-End Available Bandwidth in IP Network Paths
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
Ahmed Ait Ali, Francis Lepage
NN
2008
Springer
169views Neural Networks» more  NN 2008»
14 years 10 months ago
Modeling a flexible representation machinery of human concept learning
dely acknowledged that categorically organized abstract knowledge plays a significant role in high-order human cognition. Yet, there are many unknown issues about the nature of ho...
Toshihiko Matsuka, Yasuaki Sakamoto, Arieta Chouch...
UMC
2000
15 years 1 months ago
Upper and Lower Bounds on Continuous-Time Computation
Abstract. We consider various extensions and modifications of Shannon's General Purpose Analog Computer, which is a model of computation by differential equations in continuou...
Manuel Lameiras Campagnolo, Cristopher Moore
GCC
2003
Springer
15 years 3 months ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...