Sciweavers

507 search results - page 37 / 102
» The relation between protocols and games
Sort
View
ENTCS
2000
112views more  ENTCS 2000»
14 years 9 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
DALT
2004
Springer
15 years 3 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
MOBICOM
1999
ACM
15 years 2 months ago
WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks
Wireless wide-area networks (WWANs) are characterized by very low and variable bandwidths, very high and variable delays, significant non-congestion related losses, asymmetric upl...
Prasun Sinha, Narayanan Venkitaraman, Raghupathy S...
ISW
2010
Springer
14 years 7 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
EVOW
2010
Springer
15 years 4 months ago
Search-Based Procedural Content Generation
Recently, a small number of papers have appeared in which the authors implement stochastic search algorithms, such as evolutionary computation, to generate game content, such as le...
Julian Togelius, Georgios N. Yannakakis, Kenneth O...