Tag #protocol
866 papers:
- ASPLOS-2020-KatsarakisGKJDG #fault tolerance #named #performance #replication
- Hermes: A Fast, Fault-Tolerant and Linearizable Replication Protocol (AK, VG, MRSK, AJ, AD, BG, VN), pp. 201–217.
- CSL-2020-Cortier #security #verification
- Verification of Security Protocols (Invited Talk) (VC), p. 2.
- FM-2019-BodeveixBCF #liveness #verification
- Mechanically Verifying the Fundamental Liveness Property of the Chord Protocol (JPB, JB, DC, MF), pp. 45–63.
- IFM-2019-HsiehM #automaton #named #verification
- Dione: A Protocol Verification System Built with Dafny for I/O Automata (CH, SM), pp. 227–245.
- ECOOP-2019-MeierMC #control flow #named
- Lifestate: Event-Driven Protocols and Callback Control Flow (SM, SM, BYEC), p. 29.
- OOPSLA-2019-BarikSRC #optimisation
- Optimization of swift protocols (RB, MS, MKR, MC), p. 27.
- PADL-2019-AndersenS #combinator #distributed
- Distributed Protocol Combinators (KJAA, IS), pp. 169–186.
- CASE-2019-MiaoHZ #fault #reliability
- Reliable Cooperative Charging Protocol against Fault Data for Supercapacitors Charging Systems (YM, JH, SZ), pp. 954–959.
- ESOP-2019-GlabbeekHM #algebra #process
- A Process Algebra for Link Layer Protocols (RvG, PH, MM), pp. 668–693.
- CADE-2019-LiT #automation #proving #security #theorem proving #verification
- Combining ProVerif and Automated Theorem Provers for Security Protocol Verification (DLL, AT), pp. 354–365.
- CAV-2019-DavisHK #fault #formal method #multi #proving #using
- When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
- CAV-2019-HongLMR #bisimulation #probability #verification
- Probabilistic Bisimulation for Parameterized Systems - (with Applications to Verifying Anonymous Protocols) (CDH, AWL, RM, PR), pp. 455–474.
- CAV-2019-DamianDMW
- Communication-Closed Asynchronous Protocols (AD, CD, AM, JW), pp. 344–363.
- ICST-2019-ZhaoLWSH #framework #fuzzing #industrial #learning #named #perspective
- SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective (HZ, ZL, HW, JS, YH), pp. 59–67.
- ICTSS-2019-BombardaBGRDL #consistency #generative #refinement #state machine #testing #using
- Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
- VMCAI-2019-AndreDFL #parametricity
- Parametric Timed Broadcast Protocols (ÉA, BD, PF, DL), pp. 491–512.
- FSCD-2018-Delaune #encryption #privacy
- Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk) (SD), p. 21.
- IFM-2018-DoughertyGR #analysis #security #smt #using
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
- SEFM-2018-DuboisGPC #interactive #proving #theorem proving #using
- Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
- VS-Games-2018-Lim #case study #using
- Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
- MoDELS-2018-Rodriguez-Echeverria #framework #modelling #towards #visual notation
- Towards a Language Server Protocol Infrastructure for Graphical Modeling (RRE, JLCI, MW, JC), pp. 370–380.
- POPL-2018-SergeyWT #distributed #programming #proving
- Programming and proving with distributed protocols (IS, JRW, ZT), p. 30.
- SAS-2018-Shoham #decidability #distributed #interactive #logic #using #verification
- Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
- CC-2018-NeykovaHYA #api #distributed #f# #generative
- A session type provider: compile-time API generation of distributed protocols with refinements in F# (RN, RH, NY, FA), pp. 128–138.
- ESOP-2018-RahliVVV #coq #fault tolerance #named
- Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq (VR, IV, MV, PJEV), pp. 619–650.
- FASE-2018-LiuOSWGM #analysis #distributed #formal method #named #transaction
- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis (SL0, PCÖ, KS, QW0, IG, JM), pp. 77–93.
- CAV-2018-BlondinEJ #analysis #named
- Peregrine: A Tool for the Analysis of Population Protocols (MB, JE, SJ), pp. 604–611.
- CAV-2018-BauerCS0 #model checking #random #security
- Model Checking Indistinguishability of Randomized Security Protocols (MSB, RC, APS, MV0), pp. 117–135.
- VMCAI-2018-JacobsS
- Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity (SJ, MS), pp. 247–268.
- VMCAI-2018-ZuckMT #probability #proving
- P^5 : Planner-less Proofs of Probabilistic Parameterized Protocols (LDZ, KLM, JT), pp. 336–357.
- IFM-2017-BruschiPGLP #case study #model checking #smt #verification
- Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study - (DB, ADP, SG, AL, EP), pp. 391–406.
- ICFP-2017-Mainland #compilation #optimisation #semantics
- Better living through operational semantics: an optimizing compiler for radio protocols (GM), p. 26.
- OOPSLA-2017-CohenFL #memory management #performance
- Efficient logging in non-volatile memory by exploiting coherency protocols (NC, MF, JRL), p. 24.
- OOPSLA-2017-PadonLSS #decidability #distributed #reasoning
- Paxos made EPR: decidable reasoning about distributed protocols (OP, GL, MS, SS), p. 31.
- SAS-2017-OuadjaoutM #communication #markov #static analysis #using
- Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
- CASE-2017-LiuH #analysis #convergence
- The convergence analysis of bat-inspired consensus protocols with nonlinear dynamics (QL, QH), pp. 1560–1565.
- CASE-2017-WuXS #network #trust
- Trust-based protocol for securing routing in opportunistic networks (XW, JX, JS), pp. 434–439.
- CAV-2017-SelyuninJNRHBNG #communication #monitoring #runtime
- Runtime Monitoring with Recovery of the SENT Communication Protocol (KS, SJ, TN, CR, UH, EB, DN, RG), pp. 336–355.
- FM-2016-LiSD #automation #security #verification
- Automated Verification of Timed Security Protocols with Clock Drift (LL0, JS0, JSD), pp. 513–530.
- MoDELS-2016-BarnesCVP #communication #industrial #simulation #towards #verification
- Towards the verification of industrial communication protocols through a simulation environment based on QEMU and systemC (CB, JMC, FV, AP), pp. 207–214.
- MoDELS-2016-Kosiuczenko #contract #on the #state machine #synthesis
- On the synthesis of protocol state machines from contracts (PK), pp. 76–85.
- ECOOP-2016-MilitaoAC
- Composing Interfering Abstract Protocols (FM, JA, LC), p. 26.
- OOPSLA-2016-WeitzWTEKT #scalability #smt #verification
- Scalable verification of border gateway protocol configurations with an SMT solver (KW, DW, ET, MDE, AK, ZT), pp. 765–780.
- PPDP-2016-KouzapasDPG
- Typechecking protocols with Mungo and StMungo (DK, OD, RP, SJG), pp. 146–159.
- VMCAI-2016-AusserlechnerJK
- Tight Cutoffs for Guarded Protocols with Fairness (SA, SJ, AK), pp. 476–494.
- SIGMOD-2015-0002KBDHKFG #coordination #program analysis #transaction
- The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
- ICPC-2015-SunshineHA #api #usability
- Searching the state space: a qualitative study of API protocol usability (JS, JDH, JA), pp. 82–93.
- ICALP-v1-2015-CzyzowiczGKKSU #convergence #on the
- On Convergence and Threshold Properties of Discrete Lotka-Volterra Population Protocols (JC, LG, AK, EK, PGS, PU), pp. 393–405.
- ICALP-v2-2015-AlistarhG #polynomial
- Polylogarithmic-Time Leader Election in Population Protocols (DA, RG), pp. 479–491.
- FM-2015-BagheriKMJ #android #bound #design #detection #verification
- Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
- FM-2015-FengHTZ #model checking #named #quantum #source code
- QPMC: A Model Checker for Quantum Programs and Protocols (YF, EMH, AT, LZ), pp. 265–272.
- FM-2015-LiSLD #security #verification
- Verifying Parameterized Timed Security Protocols (LL, JS, YL, JSD), pp. 342–359.
- SEFM-2015-Vanspauwen0 #encryption #implementation #library #specification #verification
- Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications (GV, BJ), pp. 53–68.
- CHI-2015-JacksonB #development #interactive #standard
- Standards and/as Innovation: Protocols, Creativity, and Interactive Systems Development in Ecology (SJJ, SB), pp. 1769–1778.
- HCI-DE-2015-ChomaZB #communication #design #heuristic #usability
- Communication of Design Decisions and Usability Issues: A Protocol Based on Personas and Nielsen’s Heuristics (JC, LAMZ, DB), pp. 163–174.
- KDD-2015-Pratt #machine learning #predict #proving
- Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts (KBP), pp. 2049–2058.
- SEKE-2015-ChenZWQJW #api #mining
- Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
- ECOOP-2015-BurckhardtLPF #abstraction #robust #sequence
- Global Sequence Protocol: A Robust Abstraction for Replicated Shared State (SB, DL, JP, MF), pp. 568–590.
- PLDI-2015-MarrSD #metaprogramming #performance
- Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
- SAC-2015-GouthamLY #authentication #smarttech #using
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- SAC-2015-IvakiLA #reliability #taxonomy
- A taxonomy of reliable request-response protocols (NI, NL, FA), pp. 456–463.
- SAC-2015-RrushiFNHCP #specification
- By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
- CC-2015-NgCY #code generation
- Protocols by Default — Safe MPI Code Generation Based on Session Types (NN, JGdFC, NY), pp. 212–232.
- HPCA-2015-MenezoPG #energy #hybrid #performance #scalability
- Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability (LGM, VP, JÁG), pp. 198–209.
- ISMM-2015-OsterlundL #concurrent #using
- Concurrent compaction using a field pinning protocol (EÖ, WL), pp. 56–69.
- STOC-2015-BassilyS #performance
- Local, Private, Efficient Protocols for Succinct Histograms (RB, ADS), pp. 127–135.
- CAV-2015-AlurRSTU #automation #distributed #symmetry
- Automatic Completion of Distributed Protocols with Symmetry (RA, MR, CS, ST, AU), pp. 395–412.
- TAP-2015-GrinchteinCP #analysis #constraints #optimisation
- A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
- FM-2014-BonakdarpourHK #authentication #automation #knowledge-based
- Knowledge-Based Automated Repair of Authentication Protocols (BB, RH, SSK), pp. 132–147.
- FM-2014-DuggiralaWMVM #modelling #parallel #precedence
- Temporal Precedence Checking for Switched Models and Its Application to a Parallel Landing Protocol (PSD, LW, SM, MV, CAM), pp. 215–229.
- IFM-2014-BruniSNN #analysis #security
- Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
- IFM-2014-RamsdellDGR #analysis #hybrid #security
- A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
- GRAPHITE-2014-DelzannoRT #analysis
- Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
- ICGT-2014-Delzanno #distributed #model checking #verification
- Parameterized Verification and Model Checking for Distributed Broadcast Protocols (GD), pp. 1–16.
- CHI-2014-PikeMPSW #using
- Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
- ICEIS-v3-2014-LaraC #integration
- A Protocol for Command and Control Systems Integration (PL, RC), pp. 484–489.
- SEKE-2014-CheMLC #network #online #runtime #testing
- Testing Network Protocols: formally, at runtime and online (XC, SM, JL, ARC), pp. 90–93.
- SEKE-2014-DingSZ #development
- Development of A Sliding Window Protocol for Data Synchronization in a Flow Cytometer (JD, YS, DZ), pp. 626–631.
- SIGIR-2014-CormackG #evaluation #overview
- Evaluation of machine-learning protocols for technology-assisted review in electronic discovery (GVC, MRG), pp. 153–162.
- ECOOP-2014-MilitaoAC
- Rely-Guarantee Protocols (FM, JA, LC), pp. 334–359.
- ECOOP-2014-PrincehouseCJBFS #architecture #composition #named
- MiCA: A Compositional Architecture for Gossip Protocols (LP, RC, ZJ, KPB, NF, RS), pp. 644–669.
- ECOOP-2014-SunshineHA #documentation #empirical #programming
- Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming (JS, JDH, JA), pp. 157–181.
- OOPSLA-2014-TuronVD #memory management #named #navigation
- GPS: navigating weak memory with ghosts, protocols, and separation (AT, VV, DD), pp. 691–707.
- AdaEurope-2014-JaouenBPR
- PDP 4PS : Periodic-Delayed Protocol for Partitioned Systems (AJ, EB, LP, TR), pp. 149–165.
- LOPSTR-2014-TahatE #hybrid #self #synthesis #verification
- A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
- RE-2014-MartinsO #analysis #case study #fault #functional #requirements #safety #using
- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
- SAC-2014-Daniel #communication #using
- Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
- SAC-2014-HeimfarthGFA #latency #named
- GB-MAC: a backbone based low latency protocol for WSNs (TH, JCG, AVF, JPdA), pp. 692–698.
- SAC-2014-SantosBAP #health
- Integrating IEEE 11073 and constrained application protocol for personal health devices (DFSS, FB, HOA, AP), pp. 466–467.
- SAC-2014-SuzakiYTOS #testing #virtual machine
- Rollback mechanism of nested virtual machines for protocol fuzz testing (KS, TY, AT, YO, ES), pp. 1484–1491.
- SAC-2014-WenD #performance
- Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
- DATE-2014-BalckGP #generative #modelling #testing #using
- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
- DATE-2014-DijkR
- Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
- DATE-2014-JaksicC #energy #how
- DRAM-based coherent caches and how to take advantage of the coherence protocol to reduce the refresh energy (ZJ, RC), pp. 1–4.
- DATE-2014-NuzzoFIS #contract #cyber-physical #design #safety
- Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
- DATE-2014-ZebeleinHFST #communication #modelling #multi
- Model-based actor multiplexing with application to complex communication protocols (CZ, CH, JF, TS, JT), pp. 1–4.
- HPCA-2014-ZhangBES #design #named #scalability #verification
- PVCoherence: Designing flat coherence protocols for scalable verification (MZ, JDB, JE, DJS), pp. 392–403.
- PDP-2014-AtaeeG #named #performance #reliability #replication #streaming
- EagleMacaw: A Dual-Tree Replication Protocol for Efficient and Reliable P2P Media Streaming (SA, BG), pp. 112–121.
- PDP-2014-BenzaidSB #network
- An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks (CB, AS, NB), pp. 569–573.
- STOC-2014-HaitnerT
- An almost-optimally fair three-party coin-flipping protocol (IH, ET), pp. 408–416.
- STOC-2014-MillerS #quantum #robust #using
- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
- TACAS-2014-Ardeshir-LarijaniGN #concurrent #equivalence #quantum #verification
- Verification of Concurrent Quantum Protocols by Equivalence Checking (EAL, SJG, RN), pp. 500–514.
- ICST-2014-JohanssonSLAG #fuzzing #modelling #named #robust #testing
- T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols (WJ, MS, UEL, MA, VG), pp. 323–332.
- SMT-2014-CarlssonGP #analysis #constraints #programming
- Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
- VMCAI-2014-JezequelE #algorithm #distributed #message passing #verification
- Message-Passing Algorithms for the Verification of Distributed Protocols (LJ, JE), pp. 222–241.
- ITiCSE-2013-FeasterAZH #algorithm #education #network
- Serious toys II: teaching networks, protocols, and algorithms (YF, FA, JZ, JOH), pp. 273–278.
- ICALP-v2-2013-ChretienCD #automaton #security
- From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
- IFM-2013-MeryP #formal method #modelling #verification
- Formal Modelling and Verification of Population Protocols (DM, MP), pp. 208–222.
- SEFM-2013-OliveiraJW #csp #multi
- A Verified Protocol to Implement Multi-way Synchronisation and Interleaving in CSP (MVMO, ISdMJ, JW), pp. 46–60.
- DUXU-PMT-2013-FebrettiLSJKW #component #evaluation #interface
- A Component-Based Evaluation Protocol for Clinical Decision Support Interfaces (AF, KDL, JS, AEJ, GMK, DJW), pp. 232–241.
- HCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #safety #usability
- Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
- HCI-IMT-2013-CarrinoRIKM #gesture
- Gesture vs. Gesticulation: A Test Protocol (FC, AR, RI, OAK, EM), pp. 157–166.
- CAiSE-2013-YuHGV #composition #framework #testing #web #web service
- A Business Protocol Unit Testing Framework for Web Service Composition (JY, JH, SOG, SV), pp. 17–34.
- PLDI-2013-UdupaRDMMA #named #specification
- TRANSIT: specifying protocols with concolic snippets (AU, AR, JVD, SMH, MMKM, RA), pp. 287–296.
- ICSE-2013-InverardiT #automation #composition #synthesis
- Automatic synthesis of modular connectors via composition of protocol mediation patterns (PI, MT), pp. 3–12.
- SAC-2013-AllaniGP #hybrid #named
- Hyphen: a hybrid protocol for generic overlay construction in P2P environments (MA, BG, PP), pp. 423–430.
- SAC-2013-AnconaBM #consistency #dynamic analysis #multi
- Constrained global types for dynamic checking of protocol conformance in multi-agent systems (DA, MB, VM), pp. 1377–1379.
- SAC-2013-BrancoLR #bound #scalability
- Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
- SAC-2013-HoangLCMC #network
- A backward-compatible protocol for inter-routing over heterogeneous overlay networks (GNH, LL, VC, PM, HNC), pp. 649–651.
- SAC-2013-MartinaP #induction #multi #security #using #verification
- Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
- PDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #using
- Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
- PDP-2013-SchleyBR #fault
- Fault Localizing End-to-End Flow Control Protocol for Networks-on-Chip (GS, NB, MR), pp. 454–461.
- PDP-2013-TemboNB #adaptation #clustering #distributed #problem #self #simulation
- Distributed Iterative Solution of Numerical Simulation Problems on Infiniband and Ethernet Clusters via the P2PSAP Self-Adaptive Protocol (SRT, TTN, DEB), pp. 121–125.
- PPoPP-2013-DiouriGLC #energy #fault tolerance #towards
- Towards an energy estimator for fault tolerance protocols (MeMD, OG, LL, FC), pp. 313–314.
- PPoPP-2013-LifflanderMK #detection #fault tolerance #termination
- Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
- FASE-2013-BongiovanniH
- A Mechanized Model for CAN Protocols (FB, LH), pp. 266–281.
- TACAS-2013-Ardeshir-LarijaniGN #equivalence #quantum
- Equivalence Checking of Quantum Protocols (EAL, SJG, RN), pp. 478–492.
- CADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #symmetry #unification
- Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
- CAV-2013-MeierSCB #analysis #proving #security
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
- CAV-2013-SosnovichGN #network #security #using
- Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
- ICTSS-2013-PellegrinoCM #developer #security
- A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
- VMCAI-2013-BiondiLMW #information management #random
- Quantifying Information Leakage of Randomized Protocols (FB, AL, PM, AW), pp. 68–87.
- IFM-2012-GarisPCR #alloy #specification #state machine #uml
- Specifying UML Protocol State Machines in Alloy (AGG, ACRP, AC, DR), pp. 312–326.
- ICFP-2012-LaunchburyDDA #multi #performance
- Efficient lookup-table protocol in secure multiparty computation (JL, ISD, TD, AAM), pp. 189–200.
- ICEIS-v1-2012-BrzostowskiK #multi #performance
- Efficient Multi-alternative Protocol for Multi-attribute Agent Negotiation (JB, RK), pp. 247–252.
- ICEIS-v2-2012-PradoFFFL #towards
- Towards a Negotiation Protocol for ebXML (HAdP, EF, GJdLF, AHF, NCL), pp. 277–282.
- CIKM-2012-JinCKLZ #query
- A filter-based protocol for continuous queries over imprecise location data (YJ, RC, BK, KyL, YZ), pp. 365–374.
- KEOD-2012-HeardK #modelling #requirements
- Modelling Agent Protocol Requirements (JH, RCK), pp. 335–338.
- KR-2012-FelliGL #ltl #multi #specification
- Synthesizing Agent Protocols From LTL Specifications Against Multiple Partially-Observable Environments (PF, GDG, AL).
- ECMFA-2012-HamannHG #monitoring #ocl #runtime #state machine
- OCL-Based Runtime Monitoring of Applications with Protocol State Machines (LH, OH, MG), pp. 384–399.
- HILT-2012-LiSRM #analysis #realtime #scheduling
- Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
- QAPL-2012-BelardinelliGL #automation #quantum #using #verification
- Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
- ICSE-2012-PradelJAG #api #consistency #multi #specification
- Statically checking API protocol conformance with mined multi-object specifications (MP, CJ, JA, TRG), pp. 925–935.
- SAC-2012-NgWZ
- Private data deduplication protocols in cloud storage (WKN, YW, HZ), pp. 441–446.
- SAC-2012-RahmanA #authentication #named #network #robust
- DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
- SAC-2012-SalaunEPBC #distributed #in the cloud #self #verification
- Verification of a self-configuration protocol for distributed applications in the cloud (GS, XE, NDP, FB, TC), pp. 1278–1283.
- SAC-2012-SalomoniMPM #named
- S2S: a peer to peer protocol for participative sensing (PS, LAM, GP, MM), pp. 634–635.
- SAC-2012-ZhangI #trust #web #web service #xml
- An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
- CASE-2012-WangHDS #agile #analysis #simulation #using
- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
- DATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid
- Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
- DATE-2012-QinM #automation #generative #testing
- Automated generation of directed tests for transition coverage in cache coherence protocols (XQ, PM), pp. 3–8.
- DATE-2012-YangCJTZ #multi #smarttech
- A multi-parameter bio-electric ASIC sensor with integrated 2-wire data transmission protocol for wearable healthcare system (GY, JC, FJ, HT, LRZ), pp. 443–448.
- PDP-2012-BroccoB #evaluation #framework #peer-to-peer
- A Framework for a Comprehensive Evaluation of Ant-Inspired Peer-to-Peer Protocols (AB, IB), pp. 303–310.
- PDP-2012-GavaGP #algorithm #performance #security
- Performance Evaluations of a BSP Algorithm for State Space Construction of Security Protocols (FG, MG, FP), pp. 170–174.
- ESOP-2012-ChadhaCK #automation #encryption #equivalence #verification
- Automated Verification of Equivalence Properties of Cryptographic Protocols (RC, SC, SK), pp. 108–127.
- ICST-2012-ChrzaszczCST #evolution #testing
- Testing of Evolving Protocols (JC, PC, AS, AT), pp. 901–906.
- ICST-2012-GansR #smarttech #testing
- The SmartLogic Tool: Analysing and Testing Smart Card Protocols (GdKG, JdR), pp. 864–871.
- ICST-2012-Woehrle #network #search-based #testing
- Search-Based Stress Testing of Wireless Network Protocol Stacks (MW), pp. 794–803.
- ICTSS-2012-ChenV #testing
- Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
- ICTSS-2012-HiromoriUYH #evaluation #performance #testing
- Protocol Testing and Performance Evaluation for MANETs with Non-uniform Node Density Distribution (AH, TU, HY, TH), pp. 231–246.
- IJCAR-2012-DelauneKP #constraints #security
- Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
- LICS-2012-Vicary #quantum #semantics
- Higher Semantics of Quantum Protocols (JV), pp. 606–615.
- TAP-2012-ArmandoPCMB #automation #model checking #security #testing
- From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap (AA, GP, RC, AM, DB), pp. 3–18.
- VMCAI-2012-ChatterjeeR #contract
- Synthesizing Protocols for Digital Contract Signing (KC, VR), pp. 152–168.
- CBSE-2011-HeinzemannH #adaptation #architecture #communication #component #embedded #reuse #self
- Reusing dynamic communication protocols in self-adaptive embedded component architectures (CH, SH), pp. 109–118.
- QoSA-ISARCS-2011-FranksLH #metric #modelling #performance
- Performance measurements and modeling of a java-based session initiation protocol (SIP) application server (GF, DHL, CEH), pp. 63–72.
- WCRE-2011-AntunesNV #network #reverse engineering
- Reverse Engineering of Protocols from Network Traces (JA, NFN, PV), pp. 169–178.
- WCRE-2011-ScholzK #multi #source code #thread
- Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
- FM-2011-BoyerGS #configuration management #specification #verification
- Specifying and Verifying the SYNERGY Reconfiguration Protocol with LOTOS NT and CADP (FB, OG, GS), pp. 103–117.
- SEFM-2011-BorgstromHJRVPP #calculus
- Broadcast Psi-calculi with an Application to Wireless Protocols (JB, SH, MJ, PR, BV, JÅP, JP), pp. 74–89.
- CHI-2011-Freeman #eye tracking #usability #using
- Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
- CSCW-2011-ShaoLLG #web
- An operational transformation based synchronization protocol for web 2.0 applications (BS, DL, TL, NG), pp. 563–572.
- DUXU-v2-2011-Cai #assessment #human-computer #interactive
- A Camera-Aided Legibility Assessment Protocol of Displays for Enhanced Human-Computer Interaction (HC), pp. 359–367.
- HIMI-v1-2011-Pavel #analysis #authentication #case study
- Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
- HIMI-v1-2011-Pavel11a #approach #composition #design #security
- An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
- HIMI-v1-2011-PavelJ #approach #authentication #design #logic
- Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
- HIMI-v2-2011-BrandtLDBJ #communication
- Flight Deck Workload and Acceptability of Verbal and Digital Communication Protocols (SLB, JL, AQVD, VB, WWJ), pp. 463–472.
- KDIR-2011-BicegoFBCM #grid
- An Innovative Protocol for Comparing Protein Binding Sites via Atomic Grid Maps (MB, ADF, PB, AC, VM), pp. 413–422.
- MoDELS-2011-MoffettBD #consistency #model checking #uml #using #verification
- Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
- ECOOP-2011-BeckmanKA #empirical
- An Empirical Study of Object Protocols in the Wild (NEB, DK, JA), pp. 2–26.
- PLATEAU-2011-JaspanA #developer #empirical
- Are object protocols burdensome?: an empirical study of developer forums (CJ, JA), pp. 51–56.
- PEPM-2011-WangG #embedded #programming
- An embedded language for programming protocol stacks in embedded systems (YW, VG), pp. 63–72.
- POPL-2011-SchwarzSVLM #source code #static analysis
- Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol (MDS, HS, VV, PL, MMO), pp. 93–104.
- PPDP-2011-EscobarKLMMNS #analysis #encryption #unification #using
- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
- SAC-2011-LiuWYL #modelling #scalability
- Scalable CP-nets modeling for BitTorrent protocol (JL, HW, XY, JL), pp. 542–543.
- SAC-2011-MacielH #commit #rest
- Extending timestamp-based two phase commit protocol for RESTful services to meet business rules (LAHdSM, CMH), pp. 778–785.
- SAC-2011-MunizL #encryption #on the #recognition
- On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
- SAC-2011-OuederniSP #interactive
- Measuring the compatibility of service interaction protocols (MO, GS, EP), pp. 1560–1567.
- DATE-2011-GoswamiSC #communication #cyber-physical #hybrid #re-engineering
- Re-engineering cyber-physical control applications for hybrid communication protocols (DG, RS, SC), pp. 914–919.
- HPCA-2011-VantreaseLB
- Atomic Coherence: Leveraging nanophotonics to build race-free cache coherence protocols (DV, MHL, NLB), pp. 132–143.
- HPDC-2011-AhujaBFGS #modelling
- Introspective end-system modeling to optimize the transfer time of rate based protocols (VA, AB, MKF, DG, GS), pp. 61–72.
- PDP-2011-Berbecaru #authentication #mobile #named
- LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments (DB), pp. 141–145.
- PDP-2011-YangSMKS #fault tolerance
- Comparing and Refining Gossip Protocols for Fault Tolerance in Wireless P2P Systems (JY, TS, CM, DK, KUS), pp. 595–599.
- STOC-2011-Goyal #constant #using
- Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
- STOC-2011-Woodruff #approximate #black box
- Near-optimal private approximation protocols via a black box transformation (DPW), pp. 735–744.
- TACAS-2011-RavnSV #modelling #process #verification #web #web service
- Modelling and Verification of Web Services Business Activity Protocol (APR, JS, SV), pp. 357–371.
- CADE-2011-ArnaudCD #recursion #security #testing
- Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
- ICST-2011-DadeauHK #generative #security #testing
- Mutation-Based Test Generation from Security Protocols in HLPSL (FD, PCH, RK), pp. 240–248.
- VLDB-2010-ChenOZ #adaptation #database
- An Adaptive Updating Protocol for Reducing Moving Object Databases Workload (SC, BCO, ZZ), pp. 735–746.
- SEFM-2010-BenettiMV #ad hoc #model checking #network
- Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA (DB, MM, LV), pp. 191–202.
- CHI-2010-Olmsted-HawalaMHA #comparison #testing #usability #web
- Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability (ELOH, EDM, SH, KTA), pp. 2381–2390.
- CIKM-2010-RonenS10a #concurrent #network #social
- Concurrent atomic protocols for making and changing decisions in social networks (RR, OS), pp. 1337–1340.
- SEKE-2010-Bouabana-TebibelGM #ad hoc
- Secure ad-hoc routing protocol (TBT, RNG, SM), pp. 771–776.
- PADL-2010-WangG #approach #domain-specific language #implementation #stack
- A Domain-Specific Language Approach to Protocol Stack Implementation (YW, VG), pp. 183–185.
- POPL-2010-BhargavanFG #composition #security #type system #verification
- Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
- SAC-2010-CostaMB #consistency #database #distributed #mobile
- A distributed protocol for ensuring replicated database consistency in mobile computing environments (AC, JMM, AB), pp. 1688–1693.
- SAC-2010-HoqueRA #named #scalability #using
- S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
- SAC-2010-JungCKCGK #interface #multi #network #stack
- Virtual protocol stack interface for multiple wireless sensor network simulators (JJ, YC, YK, YC, BG, JK), pp. 240–241.
- SAC-2010-SenguptaMS #multi #named #network
- MMSRP: multi-wavelength Markov-based split reservation protocol for DWDM optical networks (MS, SKM, DS), pp. 689–693.
- DATE-2010-CaoN #markov
- High-fidelity markovian power model for protocols (JC, AN), pp. 267–270.
- HPCA-2010-RomanescuLSB
- UNified Instruction/Translation/Data (UNITD) coherence: One protocol to rule them all (BFR, ARL, DJS, AB), pp. 1–12.
- PDP-2010-BazN #adaptation #communication #distributed #performance #self
- A Self-adaptive Communication Protocol with Application to High Performance Peer to Peer Distributed Computing (DEB, TTN), pp. 327–333.
- PDP-2010-EbrahimiDLT #multi #named #novel
- HAMUM — A Novel Routing Protocol for Unicast and Multicast Traffic in MPSoCs (ME, MD, PL, HT), pp. 525–532.
- PPoPP-2010-HoeflerSL #communication #scalability
- Scalable communication protocols for dynamic sparse data exchange (TH, CS, AL), pp. 159–168.
- TACAS-2010-AvnitSP #automation #named #synthesis
- ACS: Automatic Converter Synthesis for SoC Bus Protocols (KA, AS, JP), pp. 343–348.
- CSL-2010-BasinC #security
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
- ICST-2010-PorresR #contract #nondeterminism #uml
- From Nondeterministic UML Protocol Statemachines to Class Contracts (IP, IR), pp. 107–116.
- ICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #using
- Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
- DocEng-2009-BoyerWA #documentation #interactive #rest #web
- A REST protocol and composite format for interactive web documents (JMB, CW, RPA), pp. 139–148.
- ICDAR-2009-SlimaneIKAH #database #evaluation #image
- A New Arabic Printed Text Image Database and Evaluation Protocols (FS, RI, SK, AMA, JH), pp. 946–950.
- SIGITE-2009-Cross #using
- Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
- SIGITE-2009-OhMP #education #encryption #internet #simulation #using
- Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
- CIAA-2009-CaoN #case study
- Formally Synthesising a Protocol Converter: A Case Study (JC, AN), pp. 249–252.
- ICALP-v2-2009-ChatzigiannakisMS
- Mediated Population Protocols (IC, OM, PGS), pp. 363–374.
- FM-2009-HeidarianSV #analysis #network
- Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
- RTA-2009-BursucC #algebra #bound #security
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
- RTA-2009-SeidlV
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (HS, KNV), pp. 118–132.
- SEFM-2009-AndresMN #testing
- Applying Formal Passive Testing to Study Temporal Properties of the Stream Control Transmission Protocol (CA, MGM, MN), pp. 73–82.
- SEFM-2009-LienO #analysis #formal method #modelling #multi
- Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
- Haskell-2009-PikeBG #embedded #experience #haskell #realtime
- Roll your own test bed for embedded real-time protocols: a haskell experience (LP, GMB, AG), pp. 61–68.
- CHI-2009-MankowskiBSS #behaviour #canonical
- Finding canonical behaviors in user protocols (WCM, PB, AS, DDS), pp. 1323–1326.
- HCI-AUII-2009-ZarraonandiaVDA #learning
- A Virtual Environment for Learning Aiport Emergency Management Protocols (TZ, MRRV, PD, IA), pp. 228–235.
- HCI-VAD-2009-ChisnellBLL #usability
- Usability for Poll Workers: A Voting System Usability Test Protocol (DC, KB, SJL, SL), pp. 458–467.
- HIMI-DIE-2009-LeeKSC #framework #multi
- A Framework for Fairness Guaranteed Multi-streaming Transport Protocol (WL, HK, DWS, JC), pp. 553–562.
- HIMI-II-2009-KimMC #clustering #network #using
- A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
- ECOOP-2009-BierhoffBA #api
- Practical API Protocol Checking with Access Permissions (KB, NEB, JA), pp. 195–219.
- ESEC-FSE-2009-BertolinoIPT #automation #behaviour #composition #synthesis
- Automatic synthesis of behavior protocols for composable web-services (AB, PI, PP, MT), pp. 141–150.
- SAC-2009-CavalliMO #approach #consistency #testing
- A passive conformance testing approach for a MANET routing protocol (ARC, SM, EMdO), pp. 207–211.
- SAC-2009-HoqueRA #authentication #privacy #robust #security #using
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- SAC-2009-Hurlin #parallel #specification #thread
- Specifying and checking protocols of multithreaded classes (CH), pp. 587–592.
- SAC-2009-KerschbaumDSB #communication #complexity #multi #on the
- On the practical importance of communication complexity for secure multi-party computation protocols (FK, DD, AS, DB), pp. 2008–2015.
- SAC-2009-KokashCRI #flexibility #network
- A flexible QoS-aware routing protocol for infrastructure-less B3G networks (NK, RSC, PGR, VI), pp. 212–216.
- SAC-2009-OliveiraA #named
- NECTAR: a DTN routing protocol based on neighborhood contact history (ECRdO, CVNdA), pp. 40–46.
- SAC-2009-PassitoMM #analysis #network #using
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
- SAC-2009-ReinkeHNGLL #network #standard #transaction
- Integrating standardized transaction protocols in service-oriented wireless sensor networks (CR, NH, JN, SG, VL, ML), pp. 2202–2203.
- SAC-2009-ZaidiBC #network #testing
- Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
- CASE-2009-ChavanZK #authentication
- A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
- DATE-2009-AvnitS #approach #design #formal method
- A formal approach to design space exploration of protocol converters (KA, AS), pp. 129–134.
- DATE-2009-EbrahimiDNMAPT #multi
- An efficent dynamic multicast routing protocol for distributing traffic in NOCs (ME, MD, MHN, SM, AAK, JP, HT), pp. 1064–1069.
- DATE-2009-FourmigueGNA #design #framework
- Co-simulation based platform for wireless protocols design explorations (AF, BG, GN, EMA), pp. 874–877.
- DATE-2009-LiNZGSS #dependence #optimisation
- Optimizations of an application-level protocol for enhanced dependability in FlexRay (WL, MDN, WZ, PG, ALSV, SAS), pp. 1076–1081.
- DATE-2009-MollCRB #modelling #performance #using
- Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
- DATE-2009-SinhaRBS #design #multi #using
- Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
- DATE-2009-ZiermannWT #network
- CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16× higher data rates (TZ, SW, JT), pp. 1088–1093.
- PDP-2009-Payeras-CapellaPFR #email #performance
- No Author Based Selective Receipt in an Efficient Certified E-mail Protocol (MPC, MMP, JLFG, LHiR), pp. 387–392.
- WRLA-2008-RiescoV09 #implementation #maude
- Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol (AR, AV), pp. 249–266.
- ESOP-2009-KikuchiK #authentication #automation #encryption #type system #verification
- Type-Based Automated Verification of Authenticity in Cryptographic Protocols (DK, NK), pp. 222–236.
- FoSSaCS-2009-Guttman #authentication #composition #encryption #testing
- Cryptographic Protocol Composition via the Authentication Tests (JDG), pp. 303–317.
- CADE-2009-CiobacaDK #convergence #equation #security
- Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
- CAV-2009-AbadiBC #modelling #proving #security
- Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
- VMCAI-2009-Cortier #security #verification
- Verification of Security Protocols (VC), pp. 5–13.
- CBSE-2008-BothZ #automation #component #consistency #parallel #recursion
- Automatic Protocol Conformance Checking of Recursive and Parallel Component-Based Systems (AB, WZ), pp. 163–179.
- WICSA-2008-LiFWWJ #approach #development
- A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation (XL, YF, JW, LW, FJ), pp. 137–146.
- ICALP-C-2008-HallgrenKSZ #quantum #verification
- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
- FM-2008-GrandyBSSR #security #verification
- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
- FM-2008-RidgeNS #approach #implementation #network
- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service (TR, MN, PS), pp. 294–309.
- SEFM-2008-Salaun #generative #specification
- Generation of Service Wrapper Protocols from Choreography Specifications (GS), pp. 313–322.
- SEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #using
- Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
- CAiSE-2008-SerrourGKB #correlation #interactive
- Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
- EDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #using
- Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
- ICEIS-DISI-2008-HuangG #api #documentation #xml
- A Locking Protocol for DOM API on XML Documents (YFH, MLG), p. 105–?.
- ICEIS-ISAS2-2008-KiyomotoOT #automation #generative #on the fly #security
- On-the-Fly Automatic Generation of Security Protocols (SK, HO, TT), pp. 97–104.
- ICEIS-ISAS2-2008-TobarraCPC #verification
- Formal Verification of the Secure Sockets Layer Protocol (MLT, DC, JJP, FC), pp. 246–252.
- ICEIS-SAIC-2008-BaguesBBGI #communication #semantics #using
- Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
- ICEIS-SAIC-2008-VallejoCAG #communication #e-commerce #standard
- Integrating a Standard Communication Protocol into an E-Commerce Environment Based on Intelligent Agents (DV, JJCS, JA, CGM), pp. 55–60.
- SEKE-2008-DaiS #online
- QuickPay Online Payment Protocol (JD, MS), pp. 223–226.
- SEKE-2008-DuffyHM #c++ #comprehension #evolution #interface #library #reverse engineering #scalability
- Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks (EBD, JOH, BAM), pp. 303–308.
- SEKE-2008-LiuLZL #logic #security
- Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
- OOPSLA-2008-GopinathanR #analysis #runtime
- Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
- SAS-2008-RamanathanSGJ #using
- Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
- ICSE-2008-ReichertKSMH #analysis #network
- A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
- ICSE-2008-XiaoLG #distributed #security
- Developing a security protocol for a distributed decision support system in a healthcare environment (LX, PHL, AG), pp. 673–682.
- SAC-2008-AndronickN #embedded
- Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
- SAC-2008-Armendariz-InigoMMM #database #named #replication
- SIPRe: a partial database replication protocol with SI replicas (JEAI, AMG, JRGdM, FDME), pp. 2181–2185.
- SAC-2008-MaagG #approach #self #testing #using
- Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
- SAC-2008-SaffarianM #algorithm #novel
- A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
- CASE-2008-LiuWJ
- A geographic source routing protocol for traffic sensing in urban environment (LL, ZW, WKJ), pp. 347–352.
- CASE-2008-ScheitererNOSG #performance #precise
- Synchronization performance of the Precision Time Protocol in the face of slave clock frequency drift (RLS, CN, DO, GS, DG), pp. 554–559.
- DAC-2008-ReshadiGG #case study #design #internet
- C-based design flow: a case study on G.729A for voice over internet protocol (VoIP) (MR, BG, DG), pp. 72–75.
- DATE-2008-AvnitDSRP #approach #formal method #problem
- A Formal Approach To The Protocol Converter Problem (KA, VD, AS, SR, SP), pp. 294–299.
- DATE-2008-FranchinoBF
- Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme (GF, GCB, TF), pp. 1051–1056.
- DATE-2008-GailliardBSV #component #corba #semantics
- Mapping Semantics of CORBA IDL and GIOP to Open Core Protocol for Portability and Interoperability of SDR Waveform Components (GG, HB, MS, FV), pp. 330–335.
- DATE-2008-Lotfi-KamranDLN
- BARP-A Dynamic Routing Protocol for Balanced Distribution of Traffic in NoCs (PLK, MD, CL, ZN), pp. 1408–1413.
- PDP-2008-KaropoulosKG #privacy
- Privacy Protection in Context Transfer Protocol (GK, GK, SG), pp. 590–596.
- PDP-2008-LiZLX #adaptation #named #self
- SAP2P: Self-adaptive and Locality-aware P2P Membership Protocol for Heterogeneous Systems (ZL, ZZ, ZL, GX), pp. 229–236.
- TACAS-2008-FismanKL #distributed #fault tolerance #on the #verification
- On Verifying Fault Tolerance of Distributed Protocols (DF, OK, YL), pp. 315–331.
- TACAS-2008-SaksenaWJ #ad hoc #graph grammar #modelling #verification
- Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols (MS, OW, BJ), pp. 18–32.
- CAV-2008-BackesLMP #abstraction #analysis #security
- The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
- CAV-2008-Cremers #analysis #security #verification
- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
- ICST-2008-GrieskampKMNSW #assurance #documentation #modelling #quality
- Model-Based Quality Assurance of Windows Protocol Documentation (WG, NK, DM, AN, KS, FLW), pp. 502–506.
- IJCAR-2008-Comon-Lundh #automation #challenge #security #verification
- Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
- IJCAR-2008-KremerMT #proving
- Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
- VMCAI-2008-DimitrovaP #abstraction #lazy evaluation #question
- Is Lazy Abstraction a Decision Procedure for Broadcast Protocols? (RD, AP), pp. 98–111.
- HT-2007-AgarwalCKNR #named
- HSTP: hyperspeech transfer protocol (SKA, DC, AK, AAN, NR), pp. 67–76.
- SIGITE-2007-YuanZ #linux #student
- Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocols (DY, JZ), pp. 271–272.
- CSMR-2007-Quante07a #comprehension #graph #process
- Dynamic Object Process Graph Extraction for Program Understanding and Protocol Recovery (JQ), pp. 345–348.
- WCRE-2007-QuanteK
- Dynamic Protocol Recovery (JQ, RK), pp. 219–228.
- WCRE-2007-ShevertalovM #reverse engineering
- A Reverse Engineering Tool for Extracting Protocols of Networked Applications (MS, SM), pp. 229–238.
- IFM-2007-FehnkerHM #modelling #network #verification
- Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks (AF, LvH, AM), pp. 253–272.
- IFM-2007-OostdijkRTVW #encryption #learning #testing #verification
- Integrating Verification, Testing, and Learning for Cryptographic Protocols (MO, VR, JT, RGdV, TACW), pp. 538–557.
- SEFM-2007-AichernigPWW #consistency #formal method #industrial #testing
- Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
- SEFM-2007-GrandyBSR #encoding #named #security
- ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
- SEFM-2007-Hameurlain #behaviour #component #flexibility #specification
- Flexible Behavioural Compatibility and Substitutability for Component Protocols: A Formal Specification (NH), pp. 391–400.
- SEFM-2007-SahaRC #modelling #using #verification
- Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
- ILC-2007-CottonB
- A metaobject protocol for CLforJava (JC, JB), p. 9.
- HCI-AS-2007-YiJ #analysis #approach #online
- The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
- OCSC-2007-MaAL #authentication
- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
- CAiSE-2007-HamadiPB #concept #modelling #privacy #web #web service
- Conceptual Modeling of Privacy-Aware Web Service Protocols (RH, HYP, BB), pp. 233–248.
- SEKE-2007-XuXW #automation #code generation #state machine #uml
- Automated Test Code Generation from UML Protocol State Machines (DX, WX, WEW), pp. 99–104.
- QAPL-2007-Smith #communication #modelling #probability #source code
- Stochastic Modelling of Communication Protocols from Source Code (MJAS), pp. 129–145.
- ESEC-FSE-2007-Hanna #implementation #lightweight #named #network #security #verification
- SLEDE: lightweight verification of sensor network security protocol implementations (YH), pp. 591–594.
- ICSE-2007-RamanathanGJ #precedence
- Path-Sensitive Inference of Function Precedence Protocols (MKR, AG, SJ), pp. 240–250.
- ICSE-2007-SkogsrudBCT #security
- Managing Impacts of Security Protocol Changes in Service-Oriented Applications (HS, BB, FC, FT), pp. 468–477.
- SAC-2007-Armendariz-InigoJMDM #bound #database #flexibility #replication
- k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
- SAC-2007-FuL #effectiveness
- An effective kNN search protocol in wireless broadcast environments (SYF, CML), pp. 925–929.
- SAC-2007-JunJ #ad hoc #automation #mobile #network
- Automated routing protocol selection in mobile ad hoc networks (TJ, CJ), pp. 906–913.
- SAC-2007-KanzakiHN #ad hoc #mobile #network #performance
- An efficient TDMA slot assignment protocol in mobile ad hoc networks (AK, TH, SN), pp. 891–895.
- SAC-2007-KarmakarG #adaptation #distributed
- Adaptive broadcast by distributed protocol switching (SK, AG), pp. 588–589.
- SAC-2007-Kofron #behaviour #component #using
- Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
- SAC-2007-Li #abstraction #parametricity #proving #verification
- Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols (YL), pp. 1534–1535.
- SAC-2007-LongoG
- A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
- SAC-2007-WuIOKM #adaptation #peer-to-peer #random
- An adaptive randomized search protocol in peer-to-peer systems (YW, TI, FO, HK, TM), pp. 533–537.
- SAC-2007-YanWZ #ad hoc #mobile #network
- Dual agreement virtual subnet protocol for mobile ad-hoc networks (KQY, SCW, GYZ), pp. 953–954.
- DAC-2007-BhojwaniM #concurrent #online #robust
- A Robust Protocol for Concurrent On-Line Test (COLT) of NoC-based Systems-on-a-Chip (PB, RNM), pp. 670–675.
- DATE-2007-GburzynskiKO #ad hoc #low cost #network #performance
- A tiny and efficient wireless ad-hoc protocol for low-cost sensor networks (PG, BK, WO), pp. 1557–1562.
- DATE-2007-MamagkakisSC #design #middleware #optimisation
- Middleware design optimization of wireless protocols based on the exploitation of dynamic input patterns (SM, DS, FC), pp. 1036–1041.
- HPCA-2007-ChengCD #adaptation
- An Adaptive Cache Coherence Protocol Optimized for Producer-Consumer Sharing (LC, JBC, DD), pp. 328–339.
- HPCA-2007-PascualGAD #architecture #fault tolerance
- A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures (RFP, JMG, MEA, JD), pp. 157–168.
- PDP-2007-CuestaRD #effectiveness
- An Effective Starvation Avoidance Mechanism to Enhance the Token Coherence Protocol (BC, AR, JD), pp. 47–54.
- PDP-2007-FlorioB #detection
- A Tool for the Expression of Failure Detection Protocols (VDF, CB), pp. 199–204.
- PDP-2007-MastroianniTV #grid #information management #resource management
- Evaluating Resource Discovery Protocols for Hierarchical and Super-Peer Grid Information Systems (CM, DT, OV), pp. 147–154.
- PDP-2007-OrtizODP #simulation
- Analyzing the benefits of protocol offload by full-system simulation (AO, JO, AFD, AP), pp. 229–237.
- WRLA-J-2004-MeseguerT07 #analysis #encryption #reachability #using #verification
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
- FASE-2007-SanchezSM #concurrent #distributed #product line
- A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces (CS, HBS, ZM), pp. 155–169.
- STOC-2007-AndrewsJS #network #scheduling
- Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads (MA, KJ, ALS), pp. 145–154.
- TACAS-2007-DoghmiGT #encryption
- Searching for Shapes in Cryptographic Protocols (SFD, JDG, FJT), pp. 523–537.
- LICS-2007-KahlerKT #encryption #infinity #model checking
- Infinite State AMC-Model Checking for Cryptographic Protocols (DK, RK, TT), pp. 181–192.
- TestCom-FATES-2007-GrepetM #ad hoc #self
- Nodes Self-similarity to Test Wireless Ad Hoc Routing Protocols (CG, SM), pp. 123–137.
- TestCom-FATES-2007-LuukkalaO #embedded #modelling #testing
- Model Based Testing of an Embedded Session and Transport Protocol (VL, IO), pp. 212–227.
- ECDL-2006-AhmadGS #concept #education #library #resource management
- Concept Space Interchange Protocol: A Protocol for Concept Map Based Resource Discovery in Educational Digital Libraries (FA, QG, TS), pp. 471–476.
- ECDL-2006-SfakakisK #graph #semantics
- A Semantics-Based Graph for the Bib-1 Access Points of the Z39.50 Protocol (MS, SK), pp. 445–448.
- VLDB-2006-HausteinHL #contest #xml
- Contest of XML Lock Protocols (MPH, TH, KL), pp. 1069–1080.
- ITiCSE-2006-DairaineEJCTL #named #network
- IREEL: remote experimentation with real protocols and applications over emulated network (LD, EE, GJ, PC, FT, EL), p. 314.
- ICALP-v2-2006-BalabanPZ #distributed #safety
- Invisible Safety of Distributed Protocols (IB, AP, LDZ), pp. 528–539.
- ICALP-v2-2006-DelauneLLT #analysis #morphism
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
- ICALP-v2-2006-KahlerKW
- A Dolev-Yao-Based Definition of Abuse-Free Protocols (DK, RK, TW), pp. 95–106.
- FM-2006-LangariT #communication #formal method #graph transformation #modelling
- Formal Modeling of Communication Protocols by Graph Transformation (ZL, RJT), pp. 348–363.
- FM-2006-Pavlovic #development
- Connector-Based Software Development: Deriving Secure Protocols (DP), pp. 598–599.
- FM-2006-UmenoL #automaton #case study #proving #safety #theorem proving #using
- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
- RTA-2006-Turuani
- The CL-Atse Protocol Analyser (MT), pp. 277–286.
- SEFM-2006-NguyenS #aspect-oriented
- VPA-Based Aspects: Better Support for AOP over Protocols (DHN, MS), pp. 167–176.
- SEFM-2006-RamsokulS #framework #modelling #named #verification #web service
- ASEHA: A Framework for Modelling and Verification ofWeb Services Protocols (PR, AS), pp. 196–205.
- ICEIS-SAIC-2006-BrzezinskiKK #mobile #safety
- Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee (JB, AK, JK), pp. 118–123.
- ICPR-v3-2006-Haralick06a #testing
- Testing The Torah Code Hypothesis: The Experimental Protocol (RMH), pp. 110–115.
- SEKE-2006-UbayashiTSMM #aspect-oriented #collaboration #metamodelling #modelling
- Aspect-Oriented and Collaborative Systems Metamodel Access Protocols for Extensible Aspect-Oriented Modeling (NU, TT, SS, YM, SM), pp. 4–10.
- SEKE-2006-ZhangYLC #formal method #game studies #novel
- A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization (LZ, JY, ML, JC), pp. 410–415.
- AdaEurope-2006-UruenaZBPP #communication #distributed #realtime
- The Arbitrated Real-Time Protocol (AR-TP): A Ravenscar Compliant Communication Protocol for High-Integrity Distributed Systems (SU, JZ, DB, JAP, JAdlP), pp. 215–226.
- QAPL-2006-AdaoMRV #analysis #security #towards
- Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
- QAPL-2006-ZhangH #analysis #formal method #streaming
- Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
- SAC-2006-AsplundN #consistency #maintenance
- Post-partition reconciliation protocols for maintaining consistency (MA, SNT), pp. 710–717.
- SAC-2006-Gutierrez-NolascoVT #interactive #semantics
- A semantic model for safe protocol interaction (SGN, NV, CLT), pp. 1599–1600.
- SAC-2006-HeatherS #analysis #infinity #security
- To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
- SAC-2006-Lo #smt
- Data sharing protocols for SMT processors (SWL), pp. 891–895.
- SAC-2006-PhanTB #benchmark #metric #mobile #performance
- A benchmark on soap’s transport protocols performance for mobile applications (TKAP, ZT, PB), pp. 1139–1144.
- SAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #set #using
- Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
- SAC-2006-RuttiWS #abstraction #implementation #interface
- Service interface: a new abstraction for implementing and composing protocols (OR, PTW, AS), pp. 691–696.
- DAC-2006-GoraiBBTM #verification
- Directed-simulation assisted formal verification of serial protocol and bridge (SG, SB, LB, PT, RSM), pp. 731–736.
- DATE-2006-Shrikumar
- 40Gbps de-layered silicon protocol engine for TCP record (HS), pp. 188–193.
- DATE-DF-2006-ZarriCDMPRT #on the #verification
- On the verification of automotive protocols (GZ, FC, FD, RM, MP, GR, CT), pp. 195–200.
- OSDI-2006-CowlingMLRS #fault tolerance #hybrid #replication
- HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance (JAC, DSM, BL, RR, LS), pp. 177–190.
- PDP-2006-GarciaHL #communication #petri net #using #validation
- Validation of a Protocol for Communication Management in CSCW Systems Using a Coloured-Petri Net Modelization (ÉG, JH, JCL), pp. 272–275.
- PDP-2006-GhafoorYDM #calculus #exception
- p_RBT-calculus Compensation and Exception Handling Protocol (AGM, JY, JD, MMuR), pp. 39–47.
- PDP-2006-WuCYR #ad hoc #mobile #network
- A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks (WW, JC, JY, MR), pp. 64–72.
- PPoPP-2006-SurJCP #design
- RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits (SS, HWJ, LC, DKP), pp. 32–39.
- FoSSaCS-2006-ZuninoD #analysis
- Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
- STOC-2006-Antonakopoulos #bound #performance
- Fast leader-election protocols with bounded cheaters’ edge (SA), pp. 187–196.
- STOC-2006-KushilevitzLR #composition #security
- Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
- TACAS-2006-BrownP #verification
- Easy Parameterized Verification of Biphase Mark and 8N1 Protocols (GMB, LP), pp. 58–72.
- LICS-2006-Gordon #implementation #security
- Provable Implementations of Security Protocols (ADG), pp. 345–346.
- TestCom-2006-ShuL #monitoring #security #testing
- Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
- TestCom-2006-SubramaniamP #testing
- Analyzing the Impact of Protocol Changes on Tests (MS, ZP), pp. 197–212.
- CBSE-2005-LiuG #performance #predict #using
- Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
- JCDL-2005-KyrillidouG #evaluation #library
- Developing the DigiQUAL protocol for digital library evaluation (MK, SG), pp. 172–173.
- ITiCSE-2005-CrescenziGI #ide #network #visualisation
- NetPrIDE an integrated environment for developing and visualizing computer network protocols (PC, GG, GI), pp. 306–310.
- ICALP-2005-DattaDMST #logic #polynomial #probability #security #semantics
- Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (AD, AD, JCM, VS, MT), pp. 16–29.
- ICALP-2005-MoranN #encryption
- Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
- FM-2005-LeiI #approach #communication
- An Approach to Unfolding Asynchronous Communication Protocols (YL, SPI), pp. 334–349.
- IFM-2005-KristensenWN #ad hoc #mobile #modelling #network #prototype
- Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks (LMK, MW, PCN), pp. 266–286.
- SEFM-2005-Hameurlain #behaviour #component #on the
- On Compatibility and Behavioural Substitutability of Component Protocols (NH), pp. 394–403.
- SEFM-2005-SubramaniamS #using
- Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
- ICEIS-v4-2005-SannaVPM #communication #lightweight #mobile
- Lightweight Client-Pull Protocol for Mobile Communication (SS, EDV, AP, CM), pp. 227–231.
- ICEIS-v4-2005-TawbiBC #communication #development #framework #web
- A Framework for Web Applications Development: A SOAP Based Communication Protocol (ST, JPB, BC), pp. 82–89.
- SEKE-2005-Shen #interactive
- The Service Interaction Protocol for the Chronobot/Virtual Classroom (CVC) System (MS), pp. 16–18.
- QAPL-2004-AldiniP05 #analysis #on the #probability
- On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
- QAPL-2004-BodeiCDBNNP05 #evaluation #performance #security
- Performance Evaluation of Security Protocols Specified in LySa (CB, MC, PD, MB, FN, HRN, CP), pp. 167–189.
- QAPL-2004-LanotteMT05 #analysis #automation
- Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
- AdaEurope-2005-MartinezH #communication #named #realtime #standard
- RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet (JMM, MGH), pp. 180–195.
- LOPSTR-2005-PettorossiPS #array #using #verification
- Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
- PPDP-2005-CortierRZ #encryption #verification
- A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
- PPDP-2005-Mitchell #analysis #logic #network #security
- Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
- ASE-2005-CouchotGK #approach #deduction #safety
- A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
- ICSE-2005-BeekMLGFS #automation #case study #verification
- A case study on the automated verification of groupware protocols (MHtB, MM, DL, SG, AF, MS), pp. 596–603.
- SAC-2005-BarrettEKMS #ad hoc #multi #network #probability
- Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios (CLB, SE, LK, MVM, JPS), pp. 1166–1173.
- SAC-2005-ByunS #communication #development
- A pattern-based development methodology for communication protocols (YB, BAS), pp. 1524–1528.
- SAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #realtime #set #validation
- An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
- SAC-2005-KanzakiHN #ad hoc #adaptation #network
- An adaptive TDMA slot assignment protocol in ad hoc sensor networks (AK, TH, SN), pp. 1160–1165.
- SAC-2005-SerranoO #framework #interactive #recursion #semantics #specification
- A semantic framework for the recursive specification of interaction protocols (JMS, SO), pp. 451–456.
- SAC-2005-Strangio #performance
- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
- DATE-2005-GhoshG #distributed #locality #named #network #scheduling
- LORD: A Localized, Reactive and Distributed Protocol for Node Scheduling in Wireless Sensor Networks (AG, TG), pp. 190–195.
- DATE-2005-VerleMAMA #optimisation #power management
- Low Power Oriented CMOS Circuit Optimization Protocol (AV, XM, NA, PM, DA), pp. 640–645.
- HPDC-2005-KarmonLS #distributed #named #performance
- GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
- PDP-2005-CalafateMM #ad hoc #interactive #mobile #network #on the
- On the Interaction Between IEEE 802.11e and Routing Protocols in Mobile Ad-Hoc Networks (CMTC, PM, MPM), pp. 110–117.
- PDP-2005-Castro-CompanyIGM #database #named
- FOBr: A Version-Based Recovery Protocol For Replicated Databases (FCC, LIB, FGN, FDME), pp. 306–313.
- PDP-2005-PetitSP #comparison #hardware
- A Comparison Study of the HLRC-DU Protocol versus a HLRC Hardware Assisted Protocol (SP, JS, AP), pp. 197–204.
- WRLA-2004-CirsteaMR05 #java #programming #rule-based #verification
- Rule-based Programming in Java For Protocol Verification (HC, PEM, AR), pp. 209–227.
- WRLA-2004-MeseguerT05 #analysis #encryption #reachability #using #verification
- Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
- ESOP-2005-CortierW #automation #proving #security
- Computationally Sound, Automated Proofs for Security Protocols (VC, BW), pp. 157–171.
- ESOP-2005-KremerR #analysis #π-calculus
- Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
- STOC-2005-KalaiLP #composition #concurrent
- Concurrent general composition of secure protocols in the timing model (YTK, YL, MP), pp. 644–653.
- STOC-2005-LepinksiMS
- Collusion-free protocols (ML, SM, AS), pp. 543–552.
- STOC-2005-PassR #encryption
- New and improved constructions of non-malleable cryptographic protocols (RP, AR), pp. 533–542.
- CADE-2005-Truderung
- Regular Protocols and Attacks with Regular Knowledge (TT), pp. 377–391.
- CAV-2005-0002G #modelling #probability #verification
- Improved Probabilistic Models for 802.11 Protocol Verification (AR, KG), pp. 239–252.
- CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #security #validation
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
- ICLP-2005-Chesani #formal method #interactive #verification
- Formalization and Verification of Interaction Protocols (FC), pp. 437–438.
- ICLP-2005-CorinSE #analysis #constraints #security
- PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
- LICS-2005-BlanchetAF #automation #security #verification
- Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
- TestCom-2005-MillerCLH #network #nondeterminism #testing
- Coping with Nondeterminism in Network Protocol Testing (REM, DC, DL, RH), pp. 129–145.
- VMCAI-2005-Goubault-LarrecqP #analysis #c #encryption
- Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
- WICSA-2004-MichielsDJV #architecture #self
- The DiPS+ Software Architecture for Self-healing Protocol Stacks (SM, LD, WJ, PV), pp. 233–242.
- ICALP-2004-AbadiC #equation #security
- Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
- ICALP-2004-AwerbuchS #distributed
- Group Spreading: A Protocol for Provably Secure Distributed Name Service (BA, CS), pp. 183–195.
- CSCW-2004-MorrisRSFV #coordination #multi #policy #social
- Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
- CSCW-2004-YangL #adaptation #collaboration #consistency
- Separating data and control: support for adaptable consistency protocols in collaborative systems (YY, DL), pp. 11–20.
- ICEIS-v1-2004-Irun-BrizMB #database #distributed #lazy evaluation #replication
- The Abortion Rate of Lazy Replication Protocols for Distributed Databases (LIB, FDME, JMBA), pp. 130–135.
- ICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #using
- Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
- SEKE-2004-ChenS #interactive #specification #verification
- Specification and Verification of Agent Interaction Protocols (BC, SS), pp. 300–305.
- PEPM-2004-PopeeaC #correctness #proving #type system #verification
- A type system for resource protocol verification and its correctness proof (CP, WNC), pp. 135–146.
- FSE-2004-WalkerV #declarative #implementation
- Implementing protocols via declarative event patterns (RJW, KV), pp. 159–169.
- ICSE-2004-RyanW #evolution #using
- Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
- SAC-2004-Al-HoumailyC #commit #named
- 1-2PC: the one-two phase atomic commit protocol (YJAH, PKC), pp. 684–691.
- SAC-2004-AlbertiDTGLM #interactive #specification #verification
- Specification and verification of agent interaction protocols in a logic-based system (MA, DD, PT, MG, EL, PM), pp. 72–78.
- SAC-2004-AwanY #commit #modelling #reliability #web
- Analytical modelling of priority commit protocol for reliable Web applications (IA, MY), pp. 313–317.
- SAC-2004-DiazCRP #automation #verification
- Automatic verification of the TLS handshake protocol (GD, FC, VVR, FLP), pp. 789–794.
- SAC-2004-FoulirasXTM #lightweight #multi #named #performance #video
- LEMP: Lightweight Efficient Multicast Protocol for video on demand (PEF, SX, NT, AM), pp. 1226–1231.
- SAC-2004-ParkerC #policy
- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
- SAC-2004-XueguangH #contract
- Further extensions of FIPA Contract Net Protocol: threshold plus DoA (XC, HS), pp. 45–51.
- DATE-v1-2004-DSilvaRS #architecture #automaton #communication #framework #modelling #verification
- Synchronous Protocol Automata: A Framework for Modelling and Verification of SoC Communication Architectures (VD, SR, AS), pp. 390–395.
- DATE-v2-2004-CasuM #implementation #latency
- Issues in Implementing Latency Insensitive Protocols (MRC, LM), pp. 1390–1391.
- DATE-v2-2004-LaouamriA #network #testing #using
- Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
- HPDC-2004-WuC #evaluation
- Evaluation of Rate-Based Transport Protocols for λ-Grids (X(W, AAC), pp. 87–96.
- PDP-2004-CalafateMM #flexibility #on-demand
- A Flexible and Tunable Route Discovery Mechanism for On-Demand Protocols (CMTC, MPM, PM), pp. 408–415.
- ESOP-2004-BugliesiFM #analysis #authentication #composition
- Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
- ESOP-2004-Shmatikov #analysis #composition #decidability #encryption
- Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
- FoSSaCS-2004-BozgaEL #effectiveness #encryption #on the
- On the Existence of an Effective and Complete Inference System for Cryptographic Protocols (LB, CE, YL), pp. 42–57.
- FoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #security
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
- TACAS-2004-BeauquierCP #automation #first-order #logic #parametricity #state machine #verification
- Automatic Parametric Verification of a Root Contention Protocol Based on Abstract State Machines and First Order Timed Logic (DB, TC, EP), pp. 372–387.
- TACAS-2004-DelzannoG #automation #encryption #verification
- Automatic Verification of Time Sensitive Cryptographic Protocols (GD, PG), pp. 342–356.
- FATES-2004-ArtsCS #development #erlang #fault tolerance
- Semi-formal Development of a Fault-Tolerant Leader Election Protocol in Erlang (TA, KC, HS), pp. 140–154.
- IJCAR-2004-SteelBM #induction
- Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
- LICS-2004-AbramskyC #category theory #quantum #semantics
- A Categorical Semantics of Quantum Protocols (SA, BC), pp. 415–425.
- TestCom-2004-Schulz #consistency #testing
- Derivation of Abstract Protocol Type Definitions for the Conformance Testing of Text-Based Protocols (SS), pp. 177–192.
- VMCAI-2004-Guttman #security #trust
- Security, Protocols, and Trust (JDG), p. 1.
- DocEng-2003-BrunDFLP #authoring #concurrent #documentation #semantics
- Semantically-based text authoring and the concurrent documentation of experimental protocols (CB, MD, EF, SL, SP), pp. 193–202.
- VLDB-2003-LuoNEW
- Locking Protocols for Materialized Aggregate Join Views (GL, JFN, CJE, MW), pp. 596–607.
- ITiCSE-2003-Turau #hypermedia #named
- HTTPExplorer: exploring the hypertext transfer protocol (VT), pp. 198–201.
- CIAA-2003-FuBS #specification #verification
- Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services (XF, TB, JS), pp. 188–200.
- FME-2003-ArmandoCG #analysis #graph #model checking #satisfiability #security #using
- SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
- FME-2003-BoyerS #constraints #synthesis #verification
- Synthesis and Verification of Constraints in the PGM Protocol (MB, MS), pp. 264–281.
- FME-2003-Rusu #composition #verification
- Compositional Verification of an ATM Protocol (VR), pp. 223–243.
- RTA-2003-Comon-LundhC #decidability #encryption #first-order #logic
- New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols (HCL, VC), pp. 148–164.
- RTA-2003-KapurNW #algorithm #composition
- An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
- EDOC-2003-HansonM #contract
- Conversation-oriented Protocols for Contract Negotiations (JEH, ZM), pp. 40–49.
- ICEIS-v2-2003-DoderoDA #collaboration #design #evaluation
- Evaluation of an Agent-Mediated Collaborative Production Protocol in an Instructional Design Scenario (JMD, PD, IA), pp. 52–57.
- ICEIS-v2-2003-SmirnovPLC #constraints #contract
- Constraint-Based Contract Net Protocol (AVS, MP, TL, NC), pp. 549–556.
- ICEIS-v4-2003-LingL #approach #composition #interactive #multi #petri net
- Engineering Multiagent Systems Based on Interaction Protocols: A Compositional Petri Net Approach (SL, SWL), pp. 42–48.
- PPDP-2003-Blanchet #approach #automation #encryption #logic programming #verification
- Automatic verification of cryptographic protocols: a logic programming approach (BB), pp. 1–3.
- SAS-2003-AbadiB #email #verification
- Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
- SAC-2003-Bella
- Availability of Protocol Goals (GB), pp. 312–317.
- SAC-2003-DattaS #energy #network
- A Simple and Energy-Efficient Routing Protocol for Radio Networks (AD, SS), pp. 1014–1018.
- SAC-2003-FrancescoP #authentication #mobile #reliability
- Authenticity in a Reliable Protocol for Mobile Computing (NDF, MP), pp. 318–324.
- SAC-2003-GuH #internet #ubiquitous #web
- Extended Internet Caching Protocol: A Foundation for Building Ubiquitous Web Caching (WG, AH), pp. 901–907.
- SAC-2003-PenaCA #approach #top-down
- A Top Down Approach for MAS Protocol Descriptions (JP, RC, JLA), pp. 45–49.
- SAC-2003-TariMM #web #web service #xml
- An XML-based Conversational Protocol for Web Services (ZT, MM, MM), pp. 1179–1184.
- SAC-2003-XiaH #configuration management #database #design #mobile
- A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration (YX, AH), pp. 550–556.
- DATE-2003-BertozziRBR #embedded #energy #optimisation #performance
- Transport Protocol Optimization for Energy Efficient Wireless Embedded Systems (DB, AR, LB, SR), pp. 10706–10713.
- DATE-2003-LiliusTV #architecture #evaluation #performance
- Fast Evaluation of Protocol Processor Architectures for IPv6 Routing (JL, DT, SV), pp. 20158–20163.
- DATE-2003-LykakisMVNPSKPR #performance
- Efficient Field Processing Cores in an Innovative Protocol Processor System-on-Chip (GL, NM, KV, NAN, SP, GS, GEK, DNP, DIR), pp. 20014–20019.
- DATE-2003-RoychoudhuryMK #debugging #using
- Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
- DATE-2003-VanzagoBCL #configuration management #design #framework #platform
- Design Space Exploration for a Wireless Protocol on a Reconfigurable Platform (LV, BB, JC, LL), pp. 10662–10667.
- PDP-2003-BaldoniM #scalability
- k-Dependency Vectors: A Scalable Causality-Tracking Protocol (RB, GM), pp. 219–226.
- PDP-2003-CalafateM #development #interface #multi #platform #programming
- A multi-platform programming interface for protocol development (CMTC, PM), pp. 243–249.
- SOSP-2003-PatelWWLS #mobile #using
- Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
- ESOP-2003-GiambiagiD #implementation #on the #security
- On the Secure Implementation of Security Protocols (PG, MD), pp. 144–158.
- ESOP-2003-GorrieriLM #analysis #encryption #realtime
- A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
- ESOP-2003-Meadows #analysis #encryption #evolution #requirements #specification #what
- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
- FoSSaCS-2003-BlanchetP #encryption #termination #verification
- Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
- FoSSaCS-2003-FokkinkP #revisited #verification
- Cones and Foci for Protocol Verification Revisited (WF, JP), pp. 267–281.
- TACAS-2003-BDSV #analysis #encryption #information management #representation
- A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
- TACAS-2003-BozgaLP #abstraction #verification
- Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
- TACAS-2003-ChkliaevHV #verification
- Verification and Improvement of the Sliding Window Protocol (DC, JH, EPdV), pp. 113–127.
- TACAS-2003-EmersonK #agile #model checking
- Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols (EAE, VK), pp. 144–159.
- TACAS-2003-EsparzaM #multi
- Simple Representative Instantiations for Multicast Protocols (JE, MM), pp. 128–143.
- CAV-2003-BozgaLP #automation #named #security #verification
- HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
- LICS-2003-ChevalierKRT
- An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
- LICS-2003-EmersonK #model checking
- Model Checking Guarded Protocols (EAE, VK), pp. 361–370.
- SAT-2003-ArmandoC #analysis #satisfiability #security
- Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
- TestCom-2003-RanganathanDM #testing #using #xml
- Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
- TestCom-2003-WuLY #modelling #testing #towards
- Towards Modeling and Testing of IP Routing Protocols (JW, ZL, XY), pp. 49–62.
- VMCAI-2003-OgataF #verification
- Formal Verification of the Horn-Preneel Micropayment Protocol (KO, KF), pp. 238–252.
- WICSA-2002-ShiH #architecture #communication #modelling #using
- Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
- ECDL-2002-SulemanF #component #design #library
- Designing Protocols in Support of Digital Library Componentization (HS, EAF), pp. 568–582.
- JCDL-2002-NelsonSW #metadata #overview
- Advanced overview of version 2.0 of the open archives initiative protocol for metadata harvesting (MLN, HVdS, SW), p. 418.
- JCDL-2002-PromH #using
- Using the open archives initiative protocols with EAD (CJP, TGH), pp. 171–180.
- JCDL-2002-Suleman #metadata
- Introduction to the open archives initiative protocol for metadata harvesting (HS), p. 414.
- VLDB-2002-BlottK #database #execution #in memory #transaction
- An Almost-Serial Protocol for Transaction Execution in Main-Memory Database Systems (SB, HFK), pp. 706–717.
- ICALP-2002-KhannaNR #communication
- Control Message Aggregation in Group Communication Protocols (SK, JN, DR), pp. 135–146.
- RTA-2002-Mitchell #analysis #multi #security
- Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
- CAiSE-2002-BenerecettiPST #model checking #multi #verification
- Verification of Payment Protocols via MultiAgent Model Checking (MB, MP, LS, ST), pp. 311–327.
- CAiSE-2002-IvanDP #approach #complexity #design #middleware #using
- Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
- ICEIS-2002-PantiSTV #automation #security #verification
- Automatic Verification of Security in Payment Protocols for Electronic Commerce (MP, LS, ST, SV), pp. 968–974.
- ICEIS-2002-SadegSA #distributed #named #realtime #transaction
- D-ANTICIP: A Protocol Suitable for Distributed Real-Time Transactions (BS, SSB, LA), pp. 171–178.
- POPL-2002-AbadiB #logic programming #security #source code
- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
- PPDP-2002-BozzanoD #automation #linear #logic #verification
- Automated protocol verification in linear logic (MB, GD), pp. 38–49.
- SAS-2002-Blanchet #authentication #security
- From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
- SAS-2002-CorinE #constraints #security #verification
- An Improved Constraint-Based System for the Verification of Security Protocols (RC, SE), pp. 326–341.
- SAC-2002-BorealeB #analysis #automation #security
- Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
- SAC-2002-BurnsideCMMDR #mobile #security
- Proxy-based security protocols in networked mobile devices (MB, DEC, TM, AM, SD, RLR), pp. 265–272.
- GPCE-2002-BarbeauB #development #generative #programming #stack #using
- A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
- DAC-2002-ChiasseriniNS #communication #energy
- Energy-efficient communication protocols (CFC, PN, VS), pp. 824–829.
- DAC-2002-SiegmundM #communication #declarative #hardware #novel #specification #synthesis
- A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications (RS, DM), pp. 602–607.
- PDP-2002-CanoM #clustering #energy #using
- Reducing Energy Consumption in a Clustered MANET using the Intra Cluster Data-Dissemination Protocol (Icdp) (JCC, PM), pp. 411–418.
- WRLA-2002-DenkerM #communication #modelling #multi #term rewriting #using
- Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
- WRLA-2002-OgataF #authentication #verification
- Rewriting-Based Verification of Authentication Protocols (KO, KF), pp. 208–222.
- WRLA-2002-Rodriguez #maude
- A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
- CAV-2002-ArmandoBBCCMRTVV #analysis #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-BozzanoD #algorithm #verification
- Algorithmic Verification of Invalidation-Based Protocols (MB, GD), pp. 295–308.
- CAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #refinement #verification
- Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
- CAV-2002-ChevalierV #automation #bound #security #verification
- Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
- TestCom-2002-Ahtiainen #formal method #mobile #testing
- Applying Formal Method in Mobile Protocol Testing (AA), p. 187–?.
- TestCom-2002-Horvath #ad hoc #automation #generative #modelling #testing #validation
- Ad-hoc Protocol Modelling, Validation and Automated Test Suite Generation (EH), p. 235–?.
- TestCom-2002-Kone
- Compliance of Wireless Application Protocols (OK), pp. 129–138.
- TestCom-2002-SeolKC #communication #generative #multi #principle #testing
- Interoperability Test Generation for Communication Protocols based on Multiple Stimuli Principle (SS, MK, STC), pp. 151–168.
- VMCAI-2002-BaukusLS #liveness #safety #verification
- Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness (KB, YL, KS), pp. 317–330.
- VMCAI-2002-Shyamasundar #encryption #framework
- Analyzing Cryptographic Protocols in a Reactive Framework (RKS), pp. 46–64.
- WICSA-2001-GeppertR #design #internet
- Collaboration-Based Design — Exemplified by the Internet Session Initiation Protocol (SIP) (BG, FR), p. 158–?.
- JCDL-2001-GreenIG #tool support
- SDLIP + STARTS = SDARTS a protocol and toolkit for metasearching (NG, PGI, LG), pp. 207–214.
- JCDL-2001-Suleman01a #repository #using
- Using the repository explorer to achieve OAI protocol compliance (HS), p. 459.
- PODS-2001-Schuldt #execution #order #process #transaction
- Process Locking: A Protocol based on Ordered Shared Locks for the Execution of Transactional Processes (HS).
- ICALP-2001-Boreale #analysis #encryption
- Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
- ICALP-2001-ComonCM #automaton #constraints #memory management #set
- Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols (HC, VC, JM), pp. 682–693.
- ICALP-2001-MuschollP #communication #finite #sequence chart
- From Finite State Communication Protocols to High-Level Message Sequence Charts (AM, DP), pp. 720–731.
- FME-2001-IglesiasGCNF #case study #prototype #specification
- From Complex Specifications to a Working Prototype. A Protocol Engineering Case Study (MJFI, FJGC, JMPC, MLN, ARF), pp. 436–448.
- FME-2001-StoySA #correctness #proving
- Proofs of Correctness of Cache-Coherence Protocols (JES, XS, A), pp. 43–71.
- FLOPS-2001-Delzanno #case study #debugging #prolog #security #specification
- Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λ Prolog — A Case-study (GD), pp. 123–137.
- CHI-2001-CardPWMRSB #analysis #behaviour #graph #usability #web
- Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
- SVIS-2001-CrescenziI #network #taxonomy #tool support #towards #visualisation
- Towards a Taxonomy of Network Protocol Visualization Tools (PC, GI), pp. 241–255.
- LOPSTR-2001-DelzannoE #debugging #logic programming #proving #security
- Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols (GD, SE), pp. 76–90.
- PADL-2001-BellaB #analysis #constraints #security
- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
- PADL-2001-Cirstea #authentication #specification #using
- Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
- PLDI-2001-DeLineF #bytecode #low level
- Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
- SAS-2001-Blanchet #encryption #prolog
- Abstracting Cryptographic Protocols by Prolog Rules (BB), pp. 433–436.
- SAS-2001-GordonJ #analysis #security
- A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
- ASE-2001-ChevalierV #lazy evaluation #security #verification
- A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
- ASE-2001-JurjensW #testing
- Formally Testing Fail-Safety of Electronic Purse Protocols (JJ, GW), pp. 408–411.
- SAC-2001-NakanoHSN #effectiveness #hypermedia #streaming #web
- Extending hypertext streaming protocol to realize effective web page transmission via a chaching proxy (TN, KH, SS, SN), pp. 440–445.
- DAC-2001-ChelceaN #interface #robust
- Robust Interfaces for Mixed-Timing Systems with Application to Latency-Insensitive Protocols (TC, SMN), pp. 21–26.
- PDP-2001-BertozziPR #communication #design
- Design of a VIA Based Communication Protocol for LAM/MPI Suite (MB, MP, MR), pp. 27–33.
- ESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #security
- Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
- FASE-2001-OlveczkyKMTZ #analysis #maude #network #realtime #specification
- Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
- STOC-2001-Ambainis #bound #quantum
- A new protocol and lower bounds for quantum coin flipping (AA), pp. 134–142.
- STOC-2001-KempeKD
- Spatial gossip and resource location protocols (DK, JMK, AJD), pp. 163–172.
- STOC-2001-NaorN #communication #evaluation
- Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
- CAV-2001-AlurW #implementation #network #refinement #verification
- Verifying Network Protocol Implementations by Symbolic Refinement Checking (RA, BYW), pp. 169–181.
- CAV-2001-KwiatkowskaNS #automation #distributed #random #using #verification
- Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
- CAV-2001-RoychoudhuryR #automation #induction #verification
- Automated Inductive Verification of Parameterized Protocols (AR, IVR), pp. 25–37.
- CAV-2001-SongPP #automation #generative #implementation #named #security #verification
- AGVI — Automatic Generation, Verification, and Implementation of Security Protocols (DXS, AP, DP), pp. 241–245.
- LICS-2001-MitchellRST #analysis #calculus #probability #process #security
- Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
- LICS-2001-Stoller #bound
- A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
- ICALP-2000-FocardiGM #analysis #encryption
- Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
- ICALP-2000-GoldbergJKP #bound #capacity
- A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols (LAG, MJ, SK, MP), pp. 705–716.
- WLC-2000-YamamuraK
- Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
- EDOC-2000-QuEM #framework #implementation #platform
- Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol (CQ, TE, CM), pp. 160–169.
- ICEIS-2000-HeL #towards
- Towards a Secure and Complete Protocol for Electronic Commerce (RH, KL), pp. 435–441.
- TOOLS-ASIA-2000-MingliangYBL #distributed #multi
- Protocol Mapping Model for Distributed Multimedia Systems (WM, QY, MB, XL), pp. 114–121.
- TOOLS-EUROPE-2000-CanalFTV #calculus #corba #interface
- Extending CORBA Interfaces with p-Calculus for Protocol Compatibility (CC, LF, JMT, AV), pp. 208–225.
- TOOLS-EUROPE-2000-ParssinenKHOT #case study #experience #uml
- UML for Protocol Engineering — Extensions and Experiences (JP, NvK, JH, TO, MT), pp. 82–93.
- TOOLS-USA-2000-SinghW #composition #design #distributed #object-oriented
- Modular Object-Oriented Design of Distributed Protocols (GS, JW), pp. 329–338.
- LOPSTR-2000-PoernomoC #proving #source code
- Protocols between programs and proofs (IP, JNC).
- LOPSTR-J-2000-PoernomoC #proving #source code
- Protocols between Programs and Proofs (IP, JNC), pp. 18–37.
- FSE-2000-ButkevichRBY #compilation #debugging #tool support
- Compiler and tool support for debugging object protocols (SB, MR, GB, MY), pp. 50–59.
- SAC-2000-Lyon #assurance #web
- Assurance Protocols and Small Web Retailers (GEL), pp. 904–908.
- SAC-2000-YeoYP #consistency #distributed #memory management
- An Asynchronous Protocol for Release Consistent Distributed Shared Memory Systems (JHY, HYY, TP), pp. 716–721.
- ASPLOS-2000-ChouCEH #compilation #using
- Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
- DAC-2000-EisnerSHNNV #design #hardware
- A methodology for formal design of hardware control with application to cache coherence protocols (CE, IS, RH, WGN, KLN, KV), pp. 724–729.
- DAC-2000-KatagiriYKHT #communication #concurrent #hardware #implementation #multi
- Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization (HK, KY, AK, TH, KT), pp. 762–767.
- DATE-2000-MurookaM
- Protocol Stack-Based Telecom-Emulator (TM, TM), pp. 186–191.
- PDP-2000-LefevreR #clustering #communication #multi #performance #thread
- Combining low-latency communication protocols with multithreading for high performance DSM systems on clusters (LL, OR), pp. 333–340.
- STOC-2000-Klauck #communication #on the #probability #quantum
- On quantum and probabilistic communication: Las Vegas and one-way protocols (HK), pp. 644–651.
- TACAS-2000-BenerecettiG #logic #model checking #security #using
- Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
- TACAS-2000-ClarkeJM #partial order #reduction #security #verification
- Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
- WRLA-2000-BasinD #analysis #comparison #haskell #maude #security
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
- WRLA-2000-MasonT #maude #network #simulation
- Simple Network Protocol Simulation within Maude (IAM, CLT), pp. 274–291.
- WRLA-2000-Millen #analysis #encryption #overview #term rewriting
- Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
- WRLA-2000-Rodriguez #analysis #case study #maude #specification
- Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
- WRLA-2000-VerdejoPM #maude
- The Leader Election Protocol of IEEE 1394 in Maude (AV, IP, NMO), pp. 383–404.
- CADE-2000-GenetK #encryption #verification
- Rewriting for Cryptographic Protocol Verification (TG, FK), pp. 271–290.
- CAV-2000-Cohen #encryption #first-order #named #verification
- TAPS: A First-Order Verifier for Cryptographic Protocols (EC), pp. 568–571.
- CAV-2000-Delzanno #automation #verification
- Automatic Verification of Parameterized Cache Coherence Protocols (GD), pp. 53–68.
- CAV-2000-Meadows #analysis #encryption #formal method
- Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
- CL-2000-DutraCB #logic programming #parallel
- The Impact of Cache Coherence Protocols on Parallel Logic Programming Systems (IdCD, VSC, RB), pp. 1285–1299.
- TestCom-2000-BousquetRSVBV #automation #testing
- Formal Test Automation: The Conference Protocol with TGV/TORX (LdB, SR, SS, CV, AB, RGdV), pp. 221–228.
- TestCom-2000-HeerinkFT #automation #testing
- Formal Test Automation: The Conference Protocol with PHACT (LH, JF, JT), pp. 211–220.
- TestCom-2000-KhoumsiADEG #approach #realtime #testing
- An Approach for Testing Real Time Protocol Entities (AK, MA, RD, AEN, LG), pp. 281–300.
- SIGMOD-1999-BreitbartKRSS #database
- Update Propagation Protocols For Replicated Databases (YB, RK, RR, SS, AS), pp. 97–108.
- ICALP-1999-ComptonD #encryption #proving
- Proof Techniques for Cryptographic Protocols (KJC, SD), pp. 25–39.
- FM-v1-1999-TabourierCI #empirical #testing #using
- A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
- FM-v1-1999-ZhouC #analysis #communication #formal method
- Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
- FM-v2-1999-CimattiPSTV #communication #specification #validation
- Formal Specification and Validation of a Vital Communication Protocol (AC, PLP, RS, PT, AV), pp. 1584–1604.
- IFM-1999-Grosse-Rhode #algebra #comparison #composition #specification
- A Compositional Comparison of Specifications of the Alternating Bit Protocol in CCS and UNITY Based on Algebra Transformation Systems (MGR), pp. 253–272.
- HCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #using
- Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
- CAiSE-1999-MelloulBSW #composition
- CPAM, A Protocol for Software Composition (LM, DB, NS, GW), pp. 11–25.
- EDOC-1999-OrvalhoFB #corba #multi #reliability
- Evaluating light-weight reliable multicast protocol extensions to the CORBA event service (JO, LF, FB), pp. 255–261.
- ICEIS-1999-JungBP #agile #framework #implementation #network #prototype
- Implementing Network Protocols in Java-A Framework for Rapid Prototyping (MJ, EB, AP), pp. 649–656.
- ICEIS-1999-JunHSKP #network #performance
- An Efficient Protocol for Radio Packet Networks (ARJ, SJH, HSS, GHK, MSP), pp. 642–648.
- TOOLS-USA-1999-PlasilBV #behaviour #bound #component
- Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
- AdaEurope-1999-RealW #multi #realtime
- The Ceiling Protocol in Multi-moded Real-Time Systems (JR, AJW), pp. 275–286.
- SAS-1999-Monniaux #automaton #encryption
- Abstracting Cryptographic Protocols with Tree Automata (DM), pp. 149–163.
- ASE-1999-BesseCL #automation #generative #testing
- An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol (CB, ARC, DL), pp. 73–80.
- ASE-1999-Brackin #analysis #automation #effectiveness #encryption #implementation
- Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
- SAC-1999-BakC #random
- Randomized Distance-Vector Routing Protocol (SB, JAC), pp. 78–84.
- DATE-1999-ONilsJ #implementation #independence #operating system #specification #synthesis
- Operating System Sensitive Device Driver Synthesis from Implementation Independent Protocol Specification (MO, AJ), pp. 562–567.
- HPCA-1999-CoxLHZ #comparison #consistency #lazy evaluation #memory management #performance
- A Performance Comparison of Homeless and Home-Based Lazy Release Consistency Protocols in Software Shared Memory (ALC, EdL, YCH, WZ), pp. 279–283.
- HPCA-1999-FalsafiW #abstraction #communication #parallel #programming #queue
- Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols (BF, DAW), pp. 182–192.
- LCTES-1999-LeeJS #database #realtime
- A Secure Dynamic Copy Protocol in Real-Time Secure Database Systems (SL, BSJ, HS), pp. 73–79.
- FoSSaCS-1999-Abadi #security #specification
- Security Protocols and Specifications (MA), pp. 1–13.
- STOC-1999-ScheidelerV #performance
- From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols (CS, BV), pp. 215–224.
- TACAS-1999-AbdullaAB #bound #verification
- Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol (PAA, AA, AB), pp. 208–222.
- TACAS-1999-KahloucheVZ #communication #consistency #hardware #testing #using
- Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
- TACAS-1999-MarchignoliM #analysis #automation #composition #encryption #verification
- Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
- CADE-1999-Weidenbach #analysis #automation #first-order #logic #security #towards
- Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
- CAV-1999-BerardF #automation #consistency #parametricity #realtime #verification
- Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol (BB, LF), pp. 96–107.
- CAV-1999-CarloniMS #latency
- Latency Insensitive Protocols (LPC, KLM, ALSV), pp. 123–133.
- CAV-1999-Schumann #analysis #authentication #automation #named
- PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
- CSL-1999-DelzannoEP #analysis #constraints
- Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
- IWTCS-1999-Cavalli #testing
- Different Approaches to Protocol and Service Testing (ARC), pp. 3–18.
- IWTCS-1999-KangSKHYKSYK #consistency #development
- Development and Application of ATM Protocol Conformance Test System (SK, YS, DK, MH, JY, IK, JS, SY, MK), pp. 331–346.
- IWTCS-1999-LatvakoskiH #communication #embedded #simulation #testing
- Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems (JL, HH), pp. 379–394.
- LICS-1999-EsparzaFM #on the #verification
- On the Verification of Broadcast Protocols (JE, AF, RM), pp. 352–359.
- LICS-1999-Paulson #proving #security
- Proving Security Protocols Correct (LCP), pp. 370–381.
- ADL-1998-NelsonMSZ #clustering #multi #using
- NCSTRL+: Adding Multi-Discipline and Multi-Genre Support to the Dienst Protocol Using Clusters and Buckets (MLN, KM, SNTS, MZ), pp. 128–136.
- ICALP-1998-MukundKRS #finite #robust
- Robust Asynchronous Protocols Are Finite-State (MM, KNK, JR, MAS), pp. 188–199.
- FM-1998-FujitaRH #case study #experience #parallel #verification
- Two Real Formal Verification Experiences: ATM Switch Chip and Parallel Cache Protocol (MF, SPR, AJH), pp. 281–295.
- TOOLS-USA-1998-ChoMK #approach #specification
- A Protocol Based Approach to Specifying Interoperability between Objects (IHC, JDM, LK), pp. 84–96.
- DAC-1998-HoltmannB #compilation #design #using
- Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
- DAC-1998-PasseroneRS #automation #interface #synthesis
- Automatic Synthesis of Interfaces Between Incompatible Protocols (RP, JAR, ALSV), pp. 8–13.
- DATE-1998-ObergHK #communication #grammarware #hardware #scheduling #synthesis
- Scheduling of Outputs in Grammar-based Hardware Synthesis of Data Communication Protocols (JÖ, AH, AK), pp. 596–603.
- HPCA-1998-SamantaBIS #clustering #design #performance
- Home-Based SVM Protocols for SMP Clusters: Design and Performance (RS, AB, LI, JPS), pp. 113–124.
- HPDC-1998-CzechHG #composition #flexibility #kernel
- Flexible Protocol Stacks by In-Kernel Composition (CBC, BH, MG), pp. 344–345.
- HPDC-1998-OguchiSTK #clustering #data mining #effectiveness #evaluation #mining #optimisation #parallel #parametricity #scalability
- Optimizing Protocol Parameters to Large Scale PC Cluster and Evaluation of its Effectiveness with Parallel Data Mining (MO, TS, TT, MK), pp. 34–41.
- HPDC-1998-PagniaT #replication
- Improving Replication Protocols through Priorities (HP, OET), pp. 342–343.
- LCTES-1998-GeorgeM #multi #reliability
- A Uniform Reliable Multicast Protocol with Guaranteed Response Times (LG, PM), pp. 65–82.
- ESOP-1998-AbadiG #bisimulation #encryption
- A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
- STOC-1998-BellareCK #analysis #approach #authentication #composition #design
- A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
- STOC-1998-ColeMHMRSSV #multi #network #random
- Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks (RC, BMM, FMadH, MM, AWR, KS, RKS, BV), pp. 378–388.
- WRLA-1998-StegglesK #case study #logic #semantics
- A timed rewriting logic semantics for SDL: A case study of alternating bit protocol (LJS, PK), pp. 83–104.
- CAV-1998-Bolignano #encryption #model checking #verification
- Integrating Proof-Based and Model-Checking Techniques for the Formal Verification of Cryptographic Protocols (DB), pp. 77–87.
- CAV-1998-EmersonN #verification
- Verification of Parameterized Bus Arbitration Protocol (EAE, KSN), pp. 452–463.
- CAV-1998-FeltyHS #verification
- Protocol Verification in Nuprl (APF, DJH, FAS), pp. 428–439.
- CAV-1998-Mitchell #analysis #finite #security
- Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
- IWTCS-1998-BourhfirDAR #consistency #generative #incremental #testing
- A Guided Incremental Test Case Generation Procedure for Conformance Testing for CEFSM Specified Protocols (CB, RD, EMA, NR), pp. 275–290.
- IWTCS-1998-Gecse #consistency #hypermedia #internet #testing
- Conformance Testing Methodology of Internet Protocols Internet Application-Layer Protocol Testing — the Hypertext Transfer Protocol (RG), pp. 35–48.
- IWTCS-1998-KahloucheVZ #automation #empirical #execution #generative #industrial #testing
- An Industrial Experiment in Automatic Generation of Executable Test Suites for a Cache Coherency Protocol (HK, CV, MZ), pp. 211–226.
- IWTCS-1998-OgishiIKS #exception
- Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
- IWTCS-1998-ShinK #testing
- Interoperability Test Suite Derivation for the ATM/B-ISDN Signaling Protocol (JS, SK), pp. 307–326.
- FME-1997-AyadiB #empirical #encryption #verification
- Verification of Cryptographic Protocols: An Experiment (MMA, DB), pp. 358–377.
- FME-1997-Gregoire #proving #using
- TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
- FME-1997-MokkedemFJ #specification #verification
- A TLA Solution to the Specification and Verification of the RLP1 Retransmission Protocol (AM, MJF, RdBJ), pp. 398–417.
- TOOLS-ASIA-1997-YanW #design #object-oriented
- An Object-Oriented Model for Protocol Design (SBY, FJW), pp. 12–21.
- TOOLS-USA-1997-SeinturierDF #distributed #object-oriented
- A Meta-Object Protocol for Distributed OO Applications (LS, LD, GF), pp. 306–317.
- PEPM-1997-MullerVM #optimisation #partial evaluation #scalability
- Scaling up Partial Evaluation for Optimizing the Sun Commercial RPC Protocol (GM, ENV, RM), pp. 116–126.
- SAC-1997-Al-HoumailyCL #commit #performance
- Enhancing the performance of presumed commit protocol (YJAH, PKC, SPL), pp. 131–133.
- SAC-1997-GhoshGP #network
- Fault-containing network protocols (SG, AG, SVP), pp. 431–437.
- SAC-1997-KhasawnehO #evaluation #network
- An evaluation study of protocols used in cable TV networks (RMK, MSO), pp. 52–57.
- SAC-1997-LuL
- A negotiation protocol for batch task assignments in dynamic load distribution (CL, SML), pp. 447–453.
- SAC-1997-MostafaS #collaboration #multi #reliability
- A reliable multicast session protocol for collaborative continuous-feed applications (WM, MS), pp. 35–39.
- HPCA-1997-AmzaCDZ #adaptation #multi
- Software DSM Protocols that Adapt between Single Writer and Multiple Writer (CA, ALC, SD, WZ), pp. 261–271.
- HPDC-1997-FriedmanR #performance
- Packing Messages as a Tool for Boosting the Performance of Total Ordering Protocols (RF, RvR), pp. 233–242.
- HPDC-1997-HaydenR #communication #optimisation
- Optimizing Layered Communication Protocols (MH, RvR), pp. 169–177.
- PDP-1997-CostaBD #logic programming #parallel
- Evaluating the impact of coherence protocols on parallel logic programming systems (VSC, RB, IdCD), pp. 376–381.
- PPoPP-1997-BianchiniCK #interactive #parallel #programming
- The Interaction of Parallel Programming Constructs and Coherence Protocols (RB, EVC, LIK), pp. 69–79.
- PPoPP-1997-RaghavachariR #named
- Ace: Linguistic Mechanisms for Customizable Protocols (MR, AR), pp. 80–89.
- STOC-1997-KargerLLPLL #consistency #distributed #random #web
- Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web (DRK, EL, FTL, RP, MSL, DL), pp. 654–663.
- TACAS-1997-DArgenioKRT #bound #exclamation
- The Bounded Retransmission Protocol Must Be on Time! (PRD, JPK, TCR, JT), pp. 416–431.
- TAPSOFT-1997-KristoffersenLLPY #composition #proving #realtime
- A Compositional Proof of a Real-Time Mutual Exclusion Protocol (KJK, FL, KGL, PP, WY0), pp. 565–579.
- CADE-1997-Schumann #automation #encryption #verification
- Automatic Verification of Cryptographic Protocols with SETHEO (JS), pp. 87–100.
- ITiCSE-1996-GrundkeZ #visualisation
- Simulator for visualizing data link layer protocols (EWG, ZZ), p. 235.
- FME-1996-BoigelotG #analysis #model checking #using
- Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
- FME-1996-HavelundS #model checking #proving #theorem proving #verification
- Experiments in Theorem Proving and Model Checking for Protocol Verification (KH, NS), pp. 662–681.
- CSCW-1996-KatzenbergPM #evolution
- Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care (BK, FP, JPM), pp. 364–369.
- CSCW-1996-PalfreymanR #web
- A Protocol for User Awareness on the World Wide Web (KP, TR), pp. 130–139.
- SEKE-1996-SlivaMS #communication
- A Method for Applying G-Nets To Communication Protocols (VPS, TM, SMS), pp. 145–152.
- ECOOP-1996-GarbinatoFG #design #distributed #reliability
- Protocol Classes for Designing Reliable Distributed Environments (BG, PF, RG), pp. 316–343.
- PLDI-1996-ChandraRL #memory management #named
- Teapot: Language Support for Writing Memory Coherence Protocols (SC, BR, JRL), pp. 237–248.
- TRI-Ada-1996-YueDL #ada
- Priority Ceiling Protocol in Ada (KbY, SD, TL), pp. 3–9.
- FSE-1996-NaumovichCO #analysis #communication #data flow #using #verification
- Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
- SAC-1996-Al-HoumailyC #commit #multi
- Dealing with incompatible presumptions of commit protocols in multidatabase systems (YJAH, PKC), pp. 186–195.
- SAC-1996-KhalilSO #network #simulation
- A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks (KMK, YSS, MSO), pp. 77–81.
- SAC-1996-MengelA #network #tutorial
- A network protocol analyzer with tutorial (SM, SA), pp. 115–119.
- SAC-1996-Nanavati #self
- A simple self-stabilizing reset protocol (AAN), pp. 93–97.
- HPCA-1996-AndersonK #adaptation #hybrid
- Two Adaptive Hybrid Cache Coherency Protocols (CA, ARK), pp. 303–313.
- HPCA-1996-RaynaudZT #adaptation #multi #scalability
- Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors (AR, ZZ, JT), pp. 323–334.
- HPCA-1996-ReisnerW #parallel
- A Cache Coherency Protocol for Optically Connected Parallel Computer Systems (JAR, TSW), pp. 222–231.
- HPCA-1996-TakahashiTKS #multi
- A Shared-Bus Control Mechanism and a Cache Coherence Protocol for a High-Performance On-Chip Multiprocessor (MT, HT, EK, SS), pp. 314–322.
- HPDC-1996-BraunCDGG #automation #compilation #distributed #implementation
- ALFred, a Protocol Compiler for the Automated Implementation of Distributed Applications (TB, IC, CD, FG, LG), pp. 450–459.
- TACAS-1996-Lowe #using
- Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
- CAV-1996-BengtssonGKLLPY #using #verification
- Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
- CAV-1996-BoigelotG #communication #infinity #using #verification
- Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (BB, PG), pp. 1–12.
- CAV-1996-FernandezGKMMS #named #validation #verification
- CADP — A Protocol Validation and Verification Toolbox (JCF, HG, AK, LM, RM, MS), pp. 437–440.
- CAV-1996-MerinoT #analysis #communication #integration #named #verification
- EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
- CAV-1996-ParkD #distributed #transaction #verification
- Protocol Verification by Aggregation of Distributed Transactions (SP, DLD), pp. 300–310.
- ISSTA-1996-BarjaktarovicCJ #functional #kernel #specification #using #verification
- Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
- ISSTA-1996-CallahanM #approach #multi #reliability #validation #verification
- An Approach to Verification and Validation of a Reliable Multicasting Protocol (JRC, TLM), pp. 187–194.
- JICSLP-1996-DeneckerBDPS #calculus #empirical #information management #representation #specification
- A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification (MD, KVB, GD, FP, DDS), pp. 170–184.
- LICS-1996-GodefroidL #queue #verification
- Symbolic Protocol Verification With Queue BDDs (PG, DEL), pp. 198–206.
- SIGMOD-1995-MoleskyR #database #memory management
- Recovery Protocols for Shared Memory Database Systems (LDM, KR), pp. 11–22.
- SEKE-1995-Lin #verification
- Formal Verification of the File Transfer Protocol (FL), pp. 117–122.
- SEKE-1995-LinL #message passing #model checking #verification
- Formal Verification of a Message-Passing Protocol with Model Checking (AL, FL), pp. 296–302.
- ECOOP-1995-Florijn #functional #parsing
- Object Protocols as Functional Parsers (GF), pp. 351–373.
- ECOOP-1995-LeaM #interface #specification #using
- Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
- ECOOP-1995-StroudW #data type #using
- Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
- OOPSLA-1995-Chiba #c++
- A Metaobject Protocol for C++ (SC), pp. 285–299.
- OOPSLA-1995-HuniJE #framework #network
- A Framework for Network Protocol Software (HH, REJ, RE), pp. 358–369.
- DAC-1995-NarayanG #generative #interface #process #using
- Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
- HPDC-1995-Sivalingam #hybrid #network
- Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks (KMS), pp. 40–47.
- HPDC-1995-TachikawaT #communication #multi
- Multimedia Intra-Group Communication Protocol (TT, MT), pp. 180–187.
- SOSP-1995-GopalakrishnanP #realtime
- A Real-time Upcall Facility for Protocol Processing with QoS Guarantees (RG, GMP), p. 231.
- STOC-1995-Yao #metric #quantum #security
- Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
- CAV-1995-HoW #analysis #automation
- Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
- PODS-1994-AlonsoAA #constraints
- Reducing Recovery Constraints on Locking based Protocols (GA, DA, AEA), pp. 129–138.
- ICALP-1994-BlundoSV #distributed
- Randomness in Distributed Protocols (CB, ADS, UV), pp. 568–579.
- LFP-1994-BiagioniHLM #ml #network #stack #standard
- Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
- CSCW-1994-FurutaS #collaboration #prototype
- Interpreted Collaboration Protocols and Their Use in Groupware Prototyping (RF, PDS), pp. 121–131.
- SEKE-1994-DuranteSV #specification
- A LOTOS specification of the SERCOS field-bus protocol (LD, RS, AV), pp. 139–147.
- OOPSLA-1994-YellinS #adaptation #automation #interface
- Interfaces, Protocols, and the Semi-Automatic Construction of Software Adaptors (DMY, RES), pp. 176–190.
- ASPLOS-1994-SkeppstedtS #algorithm #compilation
- Simple Compiler Algorithms to Reduce Ownership Operhead in Cache Coherence Protocols (JS, PS), pp. 286–296.
- DAC-1994-NarayanG #communication #generative
- Protocol Generation for Communication Channels (SN, DG), pp. 547–551.
- HPDC-1994-BurrellMP #analysis #capacity #implementation #multi #network #performance
- Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
- HPDC-1994-MoralesA #design #implementation #logic
- Design of a Header Processor for the PSi Implementation of the Logical Link Control Protocol in LANs (FAM, HAA), pp. 270–277.
- HPDC-1994-TakamuraT #communication #performance #scalability
- Large-Scale Group Communication Protocol on High-Speed Channel (MT, MT), pp. 254–261.
- PDP-1994-Beus-DukicG #evaluation #performance
- Performance Evaluation Of Time-critical Protocols (LBD, CG), pp. 400–405.
- PDP-1994-CremonesiSS #image #parallel
- Image Processing on Parallel Machines: A Protocol For Managing Global Objects (PC, NS, DGS), pp. 14–21.
- STOC-1994-FeigeK #fault #proving
- Two prover protocols: low error at affordable rates (UF, JK), pp. 172–183.
- STOC-1994-MacKenziePR #on the #probability
- On contention resolution protocols and associated probabilistic phenomena (PDM, CGP, RR), pp. 153–162.
- CAV-1994-MihailP #on the #random #testing
- On the Random Walk Method for Protocol Testing (MM, CHP), pp. 132–141.
- CAV-1994-NaikS #model checking #modelling #using #verification
- Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
- ISSTA-1994-BochmannP #overview #testing
- Protocol Testing: Review of Methods and Relevance for Software Testing (GvB, AP), pp. 109–124.
- FME-1993-WidyaH #specification #towards
- Towards an Implementation-oriented Specification of TP Protocol in LOTOS (IW, GJvdH), pp. 93–109.
- HCI-ACS-1993-Vanderheiden #generative #information management #interface #using
- Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
- TOOLS-EUROPE-1993-LakosK #modelling
- Modeling a Door Controller Protocol in LOOPN (CAL, CK), pp. 31–43.
- AdaEurope-1993-BjornfotALW #ada #distributed #runtime
- Distributed Run-Time Systems, a Protocol for Ada (LB, LA, KL, GW), pp. 249–263.
- HPDC-1993-DobosiewiczG #named #network
- DSMA: A Fair Capacity-1 Protocol for Gigabit Ring Networks (WD, PG), pp. 92–100.
- HPDC-1993-MullinTDS #communication #formal method #scheduling
- Formal Method for Scheduling, Routing and Communication Protocol (LMRM, ST, DRD, EAS), pp. 234–242.
- HPDC-1993-NakamuraT #network #performance
- Starvation-Prevented Priority-Based Total Ordering Broadcast Protocol on High-Speed Single Channel Network (AN, MT), pp. 281–288.
- SOSP-1993-MaedaB #composition #network
- Protocol Service Decomposition for High-Performance Networking (CM, BNB), pp. 244–255.
- STOC-1993-CooperL #linear #performance
- Fast perfection-information leader-election protocol with linear immunity (JC, NL), pp. 662–671.
- CAV-1993-Varaiya #automation #design
- Protocol Design for an Automated Highway System (PV), p. 180.
- ICLP-1993-LadretR #logic programming #testing
- Contribution of Logic Programming to Support Telecommunications Protocol Tests (DL, MR), pp. 845–846.
- IWPTS-1993-ChansonDKLLVZZZ #testing
- The UBC Protocol Testing Environment (STC, HD, MK, QL, YL, STV, SZ, LZ, JZ), pp. 215–230.
- IWPTS-1993-GhrigaF #adaptation #communication #nondeterminism #testing
- Adaptive Testing of Non-Deterministic Communication Protocols (MG, PGF), pp. 347–362.
- IWPTS-1993-HennigerSB #generative #specification #testing
- Test Suite Generation for Application Layer Protocols from Formal Specifications in Estelle (OH, BS, SB), pp. 67–85.
- IWPTS-1993-KalyanasundaramA #testing #visualisation
- Protocol Test Case Visualization (PK, PDA), pp. 197–214.
- IWPTS-1993-MottelerCS #fault #testing
- Fault Coverage of UIO-based Methods for Protocol Testing (HEM, AC, DPS), pp. 21–34.
- IWPTS-1993-PetrenkoDK #evaluation #on the #testing
- On Evaluation of Testability of Protocol Structures (AP, RD, HK), pp. 111–124.
- IWPTS-1993-PetrenkoYLD #consistency #nondeterminism #state machine #testing
- Nondeterministic State Machines in Protocol Conformance Testing (AP, NY, AL, AD), pp. 363–378.
- IWPTS-1993-VuongLC #communication #design #framework #testing
- A Framework for the Design for Testability of Communication Protocols (STV, AAFL, STC), pp. 89–108.
- PODS-1992-AgrawalAJ #approach #transaction
- An Approach to Eliminate Transaction Blocking in Locking Protocols (DA, AEA, RJ), pp. 223–235.
- PODS-1992-RabinovichL #commit #database #fault tolerance
- A Fault-Tolerant Commit Protocol for Replicated Databases (MR, EDL), pp. 139–148.
- SIGMOD-1992-AgrawalAJ #database #realtime #using
- Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
- SIGMOD-1992-HarrisRW #concurrent #database #multi #performance
- A High Performance Multiversion Concurrency Control Protocol of Object Databases (CH, MR, CW), p. 320.
- SIGMOD-1992-JhingranK #analysis #database #using
- Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
- SIGMOD-1992-RabinovichL #fault tolerance
- Improving Fault Tolerance and Supporting Partial Writes in Structured Coterie Protocols for Replicated Objects (MR, EDL), pp. 226–235.
- SEI-1992-Lai #education
- Teaching Protocol Engineering in Honours Year (RL), pp. 143–156.
- SEKE-1992-ZhangWG #programming
- An Open System Protocol for Agent-Oriented Programming (WRZ, WW, AG), pp. 616–623.
- ECOOP-1992-GuerraouiCLR #message passing
- Nesting Actions through Asynchronous Message Passing: the ACS Protocol (RG, RC, AL, PR), pp. 170–184.
- SOSP-WIP-1991-KasshoekRST92 #distributed
- FLIP; an Internetwork Protocol for Supporting Distributed Systems (MFK, RvR, HvS, AST), p. 29.
- ASPLOS-1992-VeenstraF #evaluation #hybrid #performance
- A Performance Evaluation of Optimal Hybrid Cache Coherency Protocols (JEV, RJF), pp. 149–160.
- HPDC-1992-BogineniD #comparison #network #performance
- Performance Comparison of Reservation and Preallocation Protocols for Star-Coupled WDM Photonic Networks (KB, PWD), pp. 94–103.
- HPDC-1992-SchmidtBS #adaptation #architecture #flexibility #lightweight #multi #named #network #performance
- ADAPTIVE: A Flexible and Adaptive Transport System Architecture to Support Lightweight Protocols for Multimedia Applications on High-Speed Networks (DCS, DFB, TS), pp. 174–186.
- IWPTS-1992-CavalliMK #automation #consistency #formal method #generative #specification #testing
- Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications (ARC, PM, SUK), pp. 237–248.
- IWPTS-1992-ChungS #generative #performance #testing
- Applications of Sufficient Conditions for Efficient Protocol Test Generation (AC, DPS), pp. 219–228.
- IWPTS-1992-Koster #consistency #problem #testing
- Problems and Difficulties with GSM Protocol Conformance Testing (RK), p. 291.
- IWPTS-1992-Witteman #consistency #experience
- Promoting the Local Test Method, GSM Protocol Conformance Test Experience (MFW), pp. 292–294.
- PODS-1991-JohnsonR #bound #consistency #replication
- A Tight Upper Bound on the Benefits of Replication and Consistency Control Protocols (DBJ, LR), pp. 75–81.
- SIGMOD-1991-LevyKS #commit #distributed #transaction
- An Optimistic Commit Protocol for Distributed Transaction Management (EL, HFK, AS), pp. 88–97.
- VLDB-1991-MohanN #performance #transaction
- Recovery and Coherency-Control Protocols for Fast Intersystem Page Transfer and Fine-Granularity Locking in a Shared Disks Transaction Environment (CM, IN), pp. 193–207.
- CHI-1991-RudnickyH #interactive #modelling #recognition #speech
- Models for evaluating interaction protocols in speech recognition (AIR, AGH), pp. 285–291.
- CCPSD-1991-Cardell-Oliver #higher-order #logic #modelling #realtime #using
- Using Higher Order Logic for Modelling Real-Time Protocols (RCO), pp. 259–282.
- IWPTS-1991-CavalliK #consistency #generative #graph grammar #term rewriting #testing #using
- Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
- IWPTS-1991-ChansonL #on the #testing
- On Static and Dynamic Test Case Selections in Protocol Confomance Testing (STC, QL), pp. 255–266.
- IWPTS-1991-CorbiS #embedded #testing
- Common Abstract Test Suite for the Connection Oriented Presentation Protocol Embedded Under Different Application Contexts (CC, GS), pp. 143–149.
- IWPTS-1991-Petrenko
- Checking Experiments with Protocol Machines (AP), pp. 83–94.
- IWPTS-1991-TretmansKB #consistency #formal method #testing
- Protocol Conformance Testing: A Formal Perspective on ISO IS-9646 (JT, PK, EB), pp. 131–142.
- IWPTS-1991-VuongA #communication #metric #on the #test coverage
- On Test Coverage Metrics for Communication Protocols (STV, JAC), pp. 31–45.
- SIGMOD-1990-BadrinathR #concurrent #evaluation #multi #performance #semantics
- Performance Evaluation of Semantics-based Multilevel Concurrency Control Protocols (BRB, KR), pp. 163–172.
- VLDB-1990-AgrawalA #approach #performance
- The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data (DA, AEA), pp. 243–254.
- OOPSLA-ECOOP-1990-Paepcke #named #testing
- PCLOS: Stress Testing CLOS Experiencing the Metaobject Protocol (AP), pp. 194–211.
- STOC-1990-BeaverMR #complexity
- The Round Complexity of Secure Protocols (DB, SM, PR), pp. 503–513.
- STOC-1990-FeigeS
- Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
- CAV-1990-LaiPD #on the #using #verification
- On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
- CAV-1990-LloretAV #communication #composition #design #petri net #using #verification
- Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
- CAV-1990-LoewensteinD #higher-order #logic #multi #simulation #using #verification
- Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
- HT-1989-Pearl
- Sun’s Link Service: A Protocol for Open Linking (AP), pp. 137–146.
- CHI-1989-KnoxBL #design #user interface
- Directed dialogue protocols: verbal data for user interface design (STK, WAB, EFL), pp. 283–287.
- OOPSLA-1989-BosL #named #parallel
- PROCOL — A Parallel Object Language with Protocols (JvdB, CL), pp. 95–102.
- SOSP-1989-SrinivasanM
- Spritely NFS: Experiments with Cache-Consistency Protocols (VS, JCM), pp. 45–57.
- CCIPL-1989-AntonB #petri net #process #specification #verification
- Formulas, Processes, and Petri-Nets Applied to the Specification and Verification of a HDLC Protocol (MDA, MB), pp. 140–154.
- STOC-1989-BabaiNS #multi #pseudo #sequence
- Multiparty Protocols and Logspace-hard Pseudorandom Sequences (LB, NN, MS), pp. 1–11.
- STOC-1989-RabinB #multi
- Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (TR, MBO), pp. 73–85.
- PODS-1988-Kelter #concurrent #queue
- The Queue Protocol: A Deadlock-free Homogeneous Non-Two-Phase Locking Protocol (UK), pp. 142–151.
- SIGMOD-1988-AbbadiT #concurrent #paradigm
- The Group Paradigm for Concurrency Control Protocols (AEA, ST), pp. 126–134.
- ICALP-1988-Tel #verification
- Assertional Verification of a Timer Based Protocol (GT), pp. 600–614.
- STOC-1988-ChaumCD #multi
- Multiparty Unconditionally Secure Protocols (DC, CC, ID), pp. 11–19.
- PODS-1987-Hadzilacos #analysis
- A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
- ICALP-1987-LarsenM #bisimulation #using #verification
- Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
- HCI-CE-1987-LuekePB #analysis #requirements
- User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
- STOC-1987-GoldreichMW #game studies #how #theorem
- How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority (OG, SM, AW), pp. 218–229.
- STOC-1987-HastadLR #analysis #multi
- Analysis of Backoff Protocols for Multiple Access Channels (JH, FTL, BR), pp. 241–253.
- LFP-1986-LermenM #distributed
- A Protocol for Distributed Reference Counting (CWL, DM), pp. 343–350.
- PODS-1985-AbbadiSC #data transformation #fault tolerance #performance
- An Efficient, Fault-Tolerant Protocol for Replicated Data Management (AEA, DS, FC), pp. 215–229.
- PODS-1985-Ramarao #commit #complexity #on the
- On the Complexity of Commit Protocols (KVSR), pp. 235–244.
- ICALP-1985-Ben-OrGMR #contract
- A Fair Protocol for Signing Contracts (MBO, OG, SM, RLR), pp. 43–52.
- STOC-1985-Bracha #random
- An O(lg n) Expected Rounds Randomized Byzantine Generals Protocol (GB), pp. 316–326.
- PODS-1984-BuckleyS #concurrent #graph #using
- Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
- POPL-1984-ShashaPE #network #verification
- Temporal Verification of Carrier-Sense Local Area Network Protocols (DS, AP, WE), pp. 54–65.
- STOC-1984-Awerbuch #network #performance
- An Efficient Network Synchronization Protocol (BA), pp. 522–525.
- STOC-1984-Willard
- Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (DEW), pp. 512–521.
- PODS-1983-PetersonS
- LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
- SIGMOD-1983-WilmsLS #distributed #execution #quote
- “I wish I were over there”: Distributed Execution Protocols for Data Definition in R* (PFW, BGL, PGS), pp. 238–242.
- VLDB-1983-BuckleyS #database #multi
- Obtaining Progressive Protocols for a Simple Multiversion Database Model (GNB, AS), pp. 74–80.
- VLDB-1983-DasguptaK #concurrent #database
- A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases (PD, ZMK), pp. 92–94.
- STOC-1983-ChandraFL83b #multi
- Multi-Party Protocols (AKC, MLF, RJL), pp. 94–99.
- PODS-1982-MenasceN #commit #evaluation #performance
- Performance Evaluation of a Two-Phase Commit Based Protocol for DDBS (DAM, TN), pp. 247–255.
- PODS-1982-MohanFS #commutative
- Compatibility and Commutativity in Non-two-phase Locking Protocols (CM, DSF, AS), pp. 283–292.
- SIGMOD-1982-Cooper #analysis #commit #distributed
- Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
- VLDB-1982-KedemMS #concurrent #performance
- An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols (ZMK, CM, AS), pp. 91–97.
- ICSE-1982-ChibaKK #communication
- A Model for Description of Communication Protocol (KC, KK, AK), pp. 424–428.
- ICSE-1982-MiyazawaOK #communication
- The Portable Communication Protocol Program COMPAS for Data Terminal Systems (KM, MO, SK), pp. 420–421.
- ICSE-1982-ShiratoriGN #communication #design
- A New Design Language for Communication Protocols and a Systematic Design Method of Communication Systems (NS, JG, SN), pp. 403–413.
- STOC-1982-DeMilloLM #encryption
- Cryptographic Protocols (RAD, NAL, MM), pp. 383–400.
- SIGMOD-1981-Skeen #commit
- Nonblocking Commit Protocols (DS), pp. 133–142.
- VLDB-1981-FussellKS #database #formal method
- A Theory of Correct Locking Protocols for Database Systems (DSF, ZMK, AS), pp. 112–124.
- ICSE-1981-BaerGGR #modelling #proving #specification
- The Two-Step Commitment Protocol: Modeling, Specification and Proof Methodology (JLB, GG, CG, GR), pp. 363–373.
- VLDB-1980-KedemS
- Non-Two-Phase Locking Protocols with Shared and Exclusive Locks (ZMK, AS), pp. 309–317.
- SIGMOD-1978-MenascePM #coordination #database #distributed
- A Locking Protocol for Resource Coordination in Distributed Databases (DAM, GJP, RRM), p. 2.
- ICSE-1976-GoudaM #analysis #design #modelling #on the
- On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.