Sciweavers

798 search results - page 95 / 160
» Statecharts as Protocols for Objects
Sort
View
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
CLUSTER
2002
IEEE
15 years 4 months ago
Algorithmic Mechanism Design for Load Balancing in Distributed Systems
Computational Grids are large scale computing system composed of geographically distributed resources (computers, storage etc.) owned by self interested agents or organizations. T...
Daniel Grosu, Anthony T. Chronopoulos
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
15 years 4 months ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
ECOOP
2010
Springer
15 years 4 months ago
Programming Coordinated Behavior in Java
Following the scenario-based approach to programming which centered around live sequence charts (LSCs), we propose a general approach to software development in Java. A program wil...
David Harel, Assaf Marron, Gera Weiss
AGENTS
2001
Springer
15 years 4 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell