Sciweavers

1777 search results - page 323 / 356
» Programming Cryptographic Protocols
Sort
View
IIWAS
2008
15 years 3 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
IJCAI
2007
15 years 3 months ago
Automated Design of Multistage Mechanisms
Mechanism design is the study of preference aggregation protocols that work well in the face of self-interested agents. We present the first general-purpose techniques for automa...
Tuomas Sandholm, Vincent Conitzer, Craig Boutilier
DLOG
2006
15 years 3 months ago
Model checking the basic modalities of CTL with Description Logic
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
108
Voted
MMNS
2004
80views Multimedia» more  MMNS 2004»
15 years 3 months ago
SIPC, a multi-function SIP user agent
Integrating multiple functions into one communication user agent can introduce many innovative communication services. For example, with networked appliance control, a user agent c...
Xiaotao Wu, Henning Schulzrinne
PARCO
2003
15 years 3 months ago
Cache Memory Behavior of Advanced PDE Solvers
Three different partial differential equation (PDE) solver kernels are analyzed in respect to cache memory performance on a simulated shared memory computer. The kernels implement...
Dan Wallin, Henrik Johansson, Sverker Holmgren