|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Cas J. F. Cremers |
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. |
CAV |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ashish Goel, Hamid Nazerzadeh |
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities. |
SODA |
2008 |
DBLP BibTeX RDF |
|
26 | Yuh-Ren Tsai |
Coverage-Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Ralf Küsters, Tomasz Truderung |
On the Automatic Analysis of Recursive Security Protocols with XOR. |
STACS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Deger Cenk Erdil, Michael J. Lewis |
Grid Resource Scheduling with Gossiping Protocols. |
Peer-to-Peer Computing |
2007 |
DBLP DOI BibTeX RDF |
|
26 | José Ghislain Quenum, Samir Aknine, Jean-Pierre Briot, Shinichi Honiden |
A Modeling Framework for Generic Agent Interaction Protocols. |
DALT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Leila Jalali, Ahmad Abdollahzadeh, Saeed Aliakbarian |
DBMSS: An event-based simulator for analyzing concurrency protocols in database systems. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Federico Chesani |
Formalization and Verification of Interaction Protocols. |
ICLP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ashok U. Mallya, Munindar P. Singh |
A Semantic Approach for Designing E-Business Protocols. |
SWSWPC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass |
Universally Composable Protocols with Relaxed Set-Up Assumptions. |
FOCS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ashok U. Mallya, Munindar P. Singh |
A Semantic Approach for Designing E-Business Protocols. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ralf Küsters, Thomas Wilke |
Automata-Based Analysis of Recursive Cryptographic Protocols. |
STACS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 |
Rushing attacks and defense in wireless ad hoc network routing protocols. |
Workshop on Wireless Security |
2003 |
DBLP DOI BibTeX RDF |
ad hoc network routing, security, routing, rushing |
26 | Li Xiao 0001, Zhichen Xu, Xiaodong Zhang 0001 |
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Hugo Krawczyk |
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Carlos O'Ryan, Fred Kuhns, Douglas C. Schmidt, Ossama Othman, Jeff Parsons |
The Design and Performance of a Pluggable Protocols Framework for Real-Time Distributed Object Computing Middleware. |
Middleware |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Mukund Raghavachari, Anne Rogers |
Ace: a language for parallel programming with customizable protocols. |
ACM Trans. Comput. Syst. |
1999 |
DBLP DOI BibTeX RDF |
parallel processing |
26 | Yuri Breitbart, Raghavan Komondoor, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz |
Update Propagation Protocols For Replicated Databases. |
SIGMOD Conference |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Mukund Raghavachari, Anne Rogers |
Ace: Linguistic Mechanisms for Customizable Protocols. |
PPoPP |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Sebastian Gajek |
A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
browser-based protocols, security model, Universal Composability |
26 | Osama S. Youness, Wail Elkilani, Waiel F. Abd El-Wahed, Fawzy A. Torkey |
A Robust Methodology for Performance Evaluation of Communication Networks Protocols. |
CNSR |
2006 |
DBLP DOI BibTeX RDF |
Performance evaluation, Network protocols, Stochastic Petri nets, Decomposition techniques |
26 | Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha |
Understanding the intruder through attacks on cryptographic protocols. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
verification, authentication, security protocols, attacks |
26 | Gergely Ács, Levente Buttyán, István Vajda |
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, routing protocols, provable security, simulatability, adversary model |
26 | Rafal Leszczyna, Janusz Górski |
Performance analysis of untraceability protocols for mobile agents using an adaptable framework. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
security, performance evaluation, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability |
26 | Ralf Küsters |
On the decidability of cryptographic protocols with open-ended data structures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Complexity, Cryptographic protocols, Decidability, Transducers |
26 | Munindar P. Singh, Amit K. Chopra, Nirmit Desai, Ashok U. Mallya |
Protocols for processes: programming in the large for open systems. |
ACM SIGPLAN Notices |
2004 |
DBLP DOI BibTeX RDF |
business processes, open systems, interaction protocols |
26 | Pinar Yolum, Munindar P. Singh |
Reasoning about Commitments in the Event Calculus: An Approach for Specifying and Executing Protocols. |
Ann. Math. Artif. Intell. |
2004 |
DBLP DOI BibTeX RDF |
methodologies, commitments, agent communication languages and protocols |
26 | Munindar P. Singh, Amit K. Chopra, Nirmit Desai, Ashok U. Mallya |
Protocols for processes: programming in the large for open systems (extended abstract). |
OOPSLA Companion |
2004 |
DBLP DOI BibTeX RDF |
business processes, open systems, interaction protocols |
26 | Alessandro Armando, Luca Compagna, Pierre Ganty |
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. |
FME |
2003 |
DBLP DOI BibTeX RDF |
SAT encodings, security protocols, bounded model-checking, SAT-solvers |
26 | Parveen Patel, Andrew Whitaker, David Wetherall, Jay Lepreau, Tim Stack |
Upgrading transport protocols using untrusted mobile code. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
untrusted mobile code, implementation, transport protocols, deployment, TCP-friendliness |
26 | Ralf H. Reussner |
Counter-Constrained Finite State Machines: A New Model for Component Protocols with Resource-Dependencies. |
SOFSEM |
2002 |
DBLP DOI BibTeX RDF |
software component protocols, finite state machine extension, decidable inclusion check, interoperability, substitutability |
26 | Mehran Abolhasan, Tadeusz A. Wysocki, Eryk Dutkiewicz |
A Review of Current On-demand Routing Protocols. |
ICN (2) |
2001 |
DBLP DOI BibTeX RDF |
Uni- cast routing protocols, Mobile ad-hoc networks, On-demand routing |
26 | Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero |
Verifying security protocols with Brutus. |
ACM Trans. Softw. Eng. Methodol. |
2000 |
DBLP DOI BibTeX RDF |
authentication and secure payment protocols, model-checking, formal methods |
26 | Inês de Castro Dutra, Vítor Santos Costa, Ricardo Bianchini |
The Impact of Cache Coherence Protocols on Parallel Logic Programming Systems. |
Computational Logic |
2000 |
DBLP DOI BibTeX RDF |
dsm architectures, performance evaluation, parallelism, logic programming, cache coherence protocols |
26 | Gurdip Singh, Jun Wu |
Modular Object-Oriented Design of Distributed Protocols. |
TOOLS (34) |
2000 |
DBLP DOI BibTeX RDF |
Distributed systems, Protocols, Synchronization, Composition |
26 | Fong Pong, Michel Dubois 0001 |
Formal Verification of Complex Coherence Protocols Using Symbolic State Models. |
J. ACM |
1998 |
DBLP DOI BibTeX RDF |
state abstraction, state enumeration methods, formal methods, shared-memory multiprocessors, cache coherence protocols |
26 | Micah Adler, Bruce M. Maggs |
Protocols for Asymmetric Communication Channels. |
FOCS |
1998 |
DBLP DOI BibTeX RDF |
communication complexity, network protocols, asymmetric |
26 | Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin |
WAR: Wireless Anonymous Routing. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Michael Menth, Rüdiger Martin |
Performance Evaluation of the Extensions for Control Message Retransmissions in RSVP. |
Protocols for High-Speed Networks |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Peter Ryan 0001 |
Open Questions (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Ross J. Anderson |
The Correctness of Crypto Transaction Sets (Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Tuomas Aura, Pekka Nikander, Jussipekka Leiwo |
DOS-Resistant Authentication with Client Puzzles. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Tuomas Aura |
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Lawrence C. Paulson |
Inductive Analysis of the Internet Protocol TLS (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Costas Busch, Malik Magdon-Ismail, Fikret Sivrikaya, Bülent Yener |
Contention-free MAC protocols for asynchronous wireless sensor networks. |
Distributed Comput. |
2008 |
DBLP DOI BibTeX RDF |
TDMA protocols, Wireless sensor networks, Self-stabilization, MAC protocols |
26 | Khaled Harfoush, Azer Bestavros, John W. Byers |
Robust Identification of Shared Losses Using End-to-End Unicast Probes. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
robust identification, shared losses, end-to-end unicast probes, Internet transport protocols, end-to-end measurements correlation, per-connection state, shared network resources, aggregate congestion control, QoS admission control, connection scheduling, mirror site selection, conditional Bayesian probing, network conditions, memoryless Markovian probing, convergence, transport protocols, identification, accuracy, digital simulation, simulation results, Bayes methods, telecommunication congestion control, convergence of numerical methods |
26 | Martín Abadi |
Explicit Communication Revisited: Two New Attacks on Authentication Protocols. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
26 | Nevin Heintze, J. D. Tygar |
A Model for Secure Protocols and Their Compositions. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
logic of authentication, protocols-composition of, security, model, model checking, communication, Authentication, formal methods, cryptography, protocols, composition, time, computer security, clocks, protocol analysis, protocol analysis, timed models |
26 | Stephen H. Brackin |
A HOL extension of GNY for automatically analyzing cryptographic protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic |
26 | A. W. Roscoe 0001 |
Modelling and verifying key-exchange protocols using CSP and FDR. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
model-checking, formal specification, protocols, formal verification, process algebra, CSP, communicating sequential processes, FDR, key-exchange protocols |
26 | Aviel D. Rubin |
Extending NCP for protocols using public keys. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
nonmonotonic cryptographic protocols, asymmetric keys, update function, principals, binding requirements, public key protocol, protocols, certificates, inference rules |
26 | Aruna Kumar Kompella, Indra Widjaja |
Burst-level admission control protocols with multirate traffic and arbitrary network topology. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
burst-level admission control protocols, multirate traffic, random access techniques, fell-and-wait, tell-and-go, end-to-end transfer delay, blocking probability characteristics, peak bit rates, performance, fairness, throughput, network topology, ATM networks, access protocols, reduced load approximation |
26 | Ali Assi 0001, Bozena Kaminska |
Modeling of communication protocols in VHDL. |
Great Lakes Symposium on VLSI |
1995 |
DBLP DOI BibTeX RDF |
ISO/CCITT class O, VLSI, VLSI, high level synthesis, VHDL, transport protocols, transport protocol, communication protocols, hardware description languages, hardware implementations, high level design, ISO standards |
26 | Krishna M. Sivalingam |
Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks. |
HPDC |
1995 |
DBLP DOI BibTeX RDF |
hybrid media access protocols, optical WDM networks, all-optical wavelength division multiplexed networks, collisionless communication, performance evaluation, multicast, broadcast, multiprocessor interconnection networks, interconnection, shared memory systems, distributed memory systems, simulation models, wavelength division multiplexing, access protocols, optical communication, system parameters, DSM system |
26 | M. M. Mourad, Ahmed N. Tantawy |
Video-on-demand: experience with protocols and their implementation. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
interactive multimedia information systems, digitally compressed information, MPEG-2 formats, standard protocols, MPEG-2 Digital Storage Media Command and Control protocol, video coding, transport protocols, video-on-demand, multimedia communication, interactive television, video signal processing, information services, information networks, interactive video |
26 | Jiayue He, Jennifer Rexford, Mung Chiang |
Don't optimize existing protocols, design optimizable protocols. |
Comput. Commun. Rev. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar |
A Family of Collusion Resistant Protocols for Instantiating Security. |
ICNP |
2005 |
DBLP DOI BibTeX RDF |
Instantiating security, Security, Collusion Resistance |
26 | Alexander Artikis, Frank Guerin, Jeremy Pitt |
Integrating Interaction Protocols and Internet Protocols for Agent-Mediated E-Commerce. |
AMEC |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly |
Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services. |
ICNP |
1997 |
DBLP DOI BibTeX RDF |
|
25 | Vishwas S. Puttasubbappa, Harry G. Perros |
Access Protocols to Support Different Service Classes in an Optical Burst Switching Ring. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Optical burst switching, access protocols, MAN, service classes |
24 | Gustavus J. Simmons |
Cryptanalysis and Protocol Failures (abstract). |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin |
On the composition of authenticated Byzantine Agreement. |
J. ACM |
2006 |
DBLP DOI BibTeX RDF |
Authenticated Byzantine Agreement, lower bounds, randomized protocols, protocol composition |
24 | Pinar Yolum |
Towards design tools for protocol development. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
protocols, tools, commitments |
24 | Xin Yuan 0001, Rami G. Melhem, Rajiv Gupta 0001 |
Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks. |
IEEE Trans. Computers |
1999 |
DBLP DOI BibTeX RDF |
mesh-like networks, path reservation, routing protocols, distributed control, wavelength-division multiplexing, time-division multiplexing, Optical interconnection networks |
24 | Mark A. Heinrich, Vijayaraghavan Soundararajan, John L. Hennessy, Anoop Gupta |
A Quantitative Analysis of the Performance and Scalability of Distributed Shared Memory. |
IEEE Trans. Computers |
1999 |
DBLP DOI BibTeX RDF |
flexible node controller, bitvector, dynamic pointer allocation, controller occupancy, distributed shared memory, performance comparison, FLASH, Cache coherence protocols, MAGIC, COMA, SCI, scalable multiprocessors |
24 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik |
Secure Group Communication Using Robust Contributory Key Agreement. |
IEEE Trans. Parallel Distributed Syst. |
2004 |
DBLP DOI BibTeX RDF |
contributory group key agreement, fault tolerance, distributed systems, group communication, cryptographic protocols, network protocols, Security and protection |
24 | Sudhir Srinivasan, Paul F. Reynolds Jr. |
Elastic Time. |
ACM Trans. Model. Comput. Simul. |
1998 |
DBLP DOI BibTeX RDF |
aggressiveness, near-perfect state information, risk, adaptive protocols, optimistic protocols |
24 | Kwok-Wa Lam, Sheung-lun Hung |
A pre-emptive transaction scheduling protocol for controlling priority inversion. |
RTCSA |
1996 |
DBLP DOI BibTeX RDF |
pre-emptive transaction scheduling protocol, hard real-time database systems, priority inversion problem, system schedulability, blocking delay, transaction preemptability, worst-case scheduling conditions, semantics, data integrity, data consistency, priority inversion, concurrency control protocols, real-time transactions, priority ceiling protocols |
24 | Satish Rao, Torsten Suel, Thanasis Tsantilas, Mark W. Goudreau |
Efficient communication using total-exchange. |
IPPS |
1995 |
DBLP DOI BibTeX RDF |
architecture-independent programming language, logical parallelism, balanced communication patterns, N-processor network, parallel processing, parallel programming, parallel programs, parallel computing, protocols, protocols, h-relation |
24 | Bülent Tavli, Wendi B. Heinzelman |
Energy and Spatial Reuse Efficient Network-Wide Real-Time Data Broadcasting in Mobile Ad Hoc Networks. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
mobile computing, wireless communication, Low-power design, routing protocols, network topology, network protocols, data communications, protocol verification, algorithm/protocol design and analysis, distributed protocols, network communications, mobile communication systems, energy-aware systems, protocol architecture, access schemes |
24 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
24 | Jeonghoon Mo, Hoi-Sheung Wilson So, Jean C. Walrand |
Comparison of Multichannel MAC Protocols. |
IEEE Trans. Mob. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Performance, 802.11, Multi-Channel MAC |
24 | S. Jayashree, B. S. Manoj 0001, C. Siva Ram Murthy |
Network lifetime driven MAC protocols for ad hoc wireless networks. |
Wirel. Networks |
2008 |
DBLP DOI BibTeX RDF |
Network (node) lifetime, Battery characteristics, Markov chain, MAC protocol, Ad hoc wireless network |
24 | Luiz Henrique A. Correia, José Marcos S. Nogueira |
Transmission power control techniques for MAC protocols in wireless sensor networks. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Bezawada Bruhadeshwar, Kishore Kothapalli |
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. |
ICDCN |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Collusion resistance |
24 | Steve Kremer, Antoine Mercier 0002, Ralf Treinen |
Proving Group Protocols Secure Against Eavesdroppers. |
IJCAR |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Abderrahim Benslimane, Cédric Ferraris, Abdelhakim Hafid |
A Comparative Analysis of Multicast Protocols for Small MANET Groups. |
ADHOC-NOW |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Muhammad Saleem 0001, Muddassar Farooq |
A framework for empirical evaluation of nature inspired routing protocols for wireless sensor networks. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Murali Krishna Ramanathan, Ananth Grama, Suresh Jagannathan |
Path-Sensitive Inference of Function Precedence Protocols. |
ICSE |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Asad Amir Pirzada, Chris McDonald, Amitava Datta |
Performance Comparison of Trust-Based Reactive Routing Protocols. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, network, Trust, protocol, ad hoc |
24 | Huafei Zhu, Tieyan Li, Feng Bao 0001 |
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Munindar P. Singh |
Interaction-Oriented Programming: Concepts, Theories, and Results on Commitment Protocols. |
Australian Conference on Artificial Intelligence |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Aurélien Bouteiller, Boris Collin, Thomas Hérault, Pierre Lemarinier, Franck Cappello |
Impact of Event Logger on Causal Message Logging Protocols for Fault Tolerant MPI. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Errors in Computational Complexity Proofs for Protocols. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Prawit Chumchu, Roksana Boreli, Aruna Seneviratne |
Performance Analysis of Reliable Multicast Transport Protocols for GEO Satellite Networks. |
MASCOTS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Ashok U. Mallya, Munindar P. Singh |
A semantic approach for designing business protocols. |
WWW (Alternate Track Papers & Posters) |
2004 |
DBLP DOI BibTeX RDF |
business process composition, web services, commitments |
24 | Ashok U. Mallya, Munindar P. Singh |
A Semantic Approach for Designing Commitment Protocols. |
AAMAS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | E. Allen Emerson, Vineet Kahlon |
Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols. |
TACAS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Dimitrios Koukopoulos, Marios Mavronicolas, Sotiris E. Nikoletseas, Paul G. Spirakis |
On the Stability of Compositions of Universally Stable, Greedy Contention-Resolution Protocols. |
DISC |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ichiro Satoh |
Dynamic Configuration of Agent Migration Protocols for the Internet. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
agent migration, protocol, mobile agent, adaptive system |
24 | Olivier Pereira, Jean-Jacques Quisquater |
A Security Analysis of the Cliques Protocols Suites. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Håkan Grahn, Per Stenström |
Relative Performance of Hardware and Software-Only Directory Protocols Under Latency Tolerating and Reducing Techniques. |
IPPS |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Eiichiro Fujisaki, Tatsuaki Okamoto |
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Ricardo Bianchini, Enrique V. Carrera, Leonidas I. Kontothanassis |
The Interaction of Parallel Programming Constructs and Coherence Protocols. |
PPoPP |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Satish Chandra 0001, Brad Richards, James R. Larus |
Teapot: Language Support for Writing Memory Coherence Protocols. |
PLDI |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Divyakant Agrawal, Amr El Abbadi, Richard Jeffers |
Using Delayed Commitment in Locking Protocols for Real-Time Databases. |
SIGMOD Conference |
1992 |
DBLP DOI BibTeX RDF |
|
24 | John G. Waclawsky, Ashok K. Agrawala |
Dynamic Queue Behavior in Networks with Window Protocols. |
SIGMETRICS |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Bo Zhang 0016, Binoy Ravindran |
Brief announcement: queuing or priority queuing? on the design of cache-coherence protocols for distributed transactional memory. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
distributed queuing, transactional memory, cache-coherence protocols |
24 | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik |
Universally Composable RFID Identification and Authentication Protocols. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
authentication and key-exchange protocols, universal composability, RFID security |
Displaying result #301 - #400 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|