Sciweavers

1490 search results - page 247 / 298
» The Logic of Authentication Protocols
Sort
View
125
Voted
DAC
1996
ACM
15 years 4 months ago
Integrating Formal Verification Methods with A Conventional Project Design Flow
We present a formal verification methodology that we have used on a computer system design project. The methodology integrates a temporal logic model checker with a conventional pr...
Ásgeir Th. Eiríksson
64
Voted
IJCAI
2007
15 years 2 months ago
Learning to Count by Think Aloud Imitation
Although necessary, learning to discover new solutions is often long and difficult, even for supposedly simple tasks such as counting. On the other hand, learning by imitation pr...
Laurent Orseau
83
Voted
SERP
2003
15 years 2 months ago
A Software Library for SyncML Server Applications
The SyncML, the standard synchronization protocol, supports the synchronization of various application services such as an address book, a calendar. Even with this standard protoc...
JiYeon Lee, Hoon Choi
96
Voted
ICNP
2009
IEEE
15 years 7 months ago
Better by a HAIR: Hardware-Amenable Internet Routing
—Routing protocols are implemented in the form of software running on a general-purpose microprocessor. However, conventional software-based router architectures face significan...
Firat Kiyak, Brent Mochizuki, Eric Keller, Matthew...
116
Voted
HUC
2007
Springer
15 years 6 months ago
Haggle: Seamless Networking for Mobile Applications
This paper presents Haggle, an architecture for mobile devices that enables seamless network connectivity and application functionality in dynamic mobile environments. Current appl...
Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal...