Sciweavers

507 search results - page 35 / 102
» The relation between protocols and games
Sort
View
CW
2004
IEEE
15 years 1 months ago
Peer-to-Peer Networked Field-type Virtual Environment by Using AtoZ
This paper aims to study how to gain the consistency of the state in a DVE (Distributed Virtual Environment) with lag, under the condition of peer-to-peer architecture. That is, w...
Tatsuhiro Yonekura, Yoshihiro Kawano, Dai Hanawa
NEW2AN
2007
Springer
15 years 3 months ago
Performance Analysis of the REAchability Protocol for IPv6 Multihoming
Abstract. There is ongoing work on the IETF aimed to provide support for different flavors of multihoming configurations, such as SHIM6 for multihomed sites, multiple CoAs suppo...
Antonio de la Oliva, Marcelo Bagnulo, Alberto Garc...
CSFW
2010
IEEE
15 years 1 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
CSFW
2005
IEEE
15 years 3 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
CIT
2007
Springer
15 years 3 months ago
An 802.11 Based MAC Protocol for Providing QoS to Real Time Applications
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Mayank Mishra, Anirudha Sahoo