Sciweavers

798 search results - page 15 / 160
» Statecharts as Protocols for Objects
Sort
View
ASWEC
2006
IEEE
15 years 5 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
CCR
1998
75views more  CCR 1998»
14 years 11 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
MIR
2010
ACM
226views Multimedia» more  MIR 2010»
15 years 6 months ago
Automatically annotating the MIR Flickr dataset: experimental protocols, openly available data and semantic spaces
The availability of a large, freely redistributable set of highquality annotated images is critical to allowing researchers in the area of automatic annotation, generic object rec...
Jonathon S. Hare, Paul H. Lewis
MASCOTS
2007
15 years 1 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
C++
1994
132views more  C++ 1994»
15 years 1 months ago
ASX: An Object-Oriented Framework for Developing Distributed Applications
The ADAPTIVE Service eXecutive (ASX) is a highly modular and extensible object-oriented framework that simplifies the development and configuration of distributed applications on ...
Douglas C. Schmidt