Sciweavers

1777 search results - page 179 / 356
» Programming Cryptographic Protocols
Sort
View
FORTE
2011
14 years 4 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
ICCCN
2007
IEEE
15 years 7 months ago
SCUBE: A DoS-Resistant Distributed Search Protocol
– Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromise...
Souvik Ray, Zhao Zhang
IFIP
2004
Springer
15 years 6 months ago
Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Tree
We consider the problem of computing the optimal swap edges of a shortest-path tree. This theoretical problem arises in practice in systems that offer point-offailure shortest-path...
Paola Flocchini, Antonio Mesa Enriques, Linda Pagl...
ICRA
2002
IEEE
151views Robotics» more  ICRA 2002»
15 years 6 months ago
Protocols for Collaboration, Coordination and Dynamic Role Assignment in a Robot Team
—Creation of cooperative robot teams for complex tasks requires not only agents that can function well individually but also agents that can coordinate their actions. This paper ...
Rosemary Emery, Kevin Sikorski, Tucker R. Balch
AOSD
2006
ACM
15 years 5 months ago
Reflections on aspects and configurable protocols
The goals of aspect oriented software development (AOSD) and frameworks for configurable protocols (CPs) are similar in many respects. AOSD allows the specification of crosscuttin...
Matti A. Hiltunen, François Taïani, Ri...