Sciweavers

1490 search results - page 169 / 298
» The Logic of Authentication Protocols
Sort
View
93
Voted
IPPS
2003
IEEE
15 years 5 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
87
Voted
CORR
2011
Springer
146views Education» more  CORR 2011»
14 years 4 months ago
Exploratory simulation of an Intelligent Iris Verifier Distributed System
— This paper discusses some topics related to the latest trends in the field of evolutionary approaches to iris recognition. It presents the results of an exploratory experimenta...
Nicolaie Popescu-Bodorin, Valentina E. Balas
93
Voted
ECAI
2006
Springer
15 years 4 months ago
A Logic-Based Framework to Compute Pareto Agreements in One-Shot Bilateral Negotiation
Abstract. We propose a logic-based approach to automated oneshot multi-issue bilateral negotiation. We use logic in two ways: (1) a logic theory to represent relations among issues...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...
77
Voted
ESAS
2007
Springer
15 years 6 months ago
Private Handshakes
—Nowadays, users are increasingly concerned about individual privacy in cyberspace and Internet. In this paper, we propose the concept of private handshakes with optional account...
Jaap-Henk Hoepman
127
Voted
ICIW
2007
IEEE
15 years 23 days ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...