BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
protocol
Google protocol

Tag #protocol

866 papers:

ASPLOSASPLOS-2020-KatsarakisGKJDG #fault tolerance #named #performance #replication
Hermes: A Fast, Fault-Tolerant and Linearizable Replication Protocol (AK, VG, MRSK, AJ, AD, BG, VN), pp. 201–217.
CSLCSL-2020-Cortier #security #verification
Verification of Security Protocols (Invited Talk) (VC), p. 2.
FMFM-2019-BodeveixBCF #liveness #verification
Mechanically Verifying the Fundamental Liveness Property of the Chord Protocol (JPB, JB, DC, MF), pp. 45–63.
IFM-2019-HsiehM #automaton #named #verification
Dione: A Protocol Verification System Built with Dafny for I/O Automata (CH, SM), pp. 227–245.
ECOOPECOOP-2019-MeierMC #control flow #named
Lifestate: Event-Driven Protocols and Callback Control Flow (SM, SM, BYEC), p. 29.
OOPSLAOOPSLA-2019-BarikSRC #optimisation
Optimization of swift protocols (RB, MS, MKR, MC), p. 27.
PADLPADL-2019-AndersenS #combinator #distributed
Distributed Protocol Combinators (KJAA, IS), pp. 169–186.
CASECASE-2019-MiaoHZ #fault #reliability
Reliable Cooperative Charging Protocol against Fault Data for Supercapacitors Charging Systems (YM, JH, SZ), pp. 954–959.
ESOPESOP-2019-GlabbeekHM #algebra #process
A Process Algebra for Link Layer Protocols (RvG, PH, MM), pp. 668–693.
CADECADE-2019-LiT #automation #proving #security #theorem proving #verification
Combining ProVerif and Automated Theorem Provers for Security Protocol Verification (DLL, AT), pp. 354–365.
CAVCAV-2019-DavisHK #fault #formal method #multi #proving #using
When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
CAVCAV-2019-HongLMR #bisimulation #probability #verification
Probabilistic Bisimulation for Parameterized Systems - (with Applications to Verifying Anonymous Protocols) (CDH, AWL, RM, PR), pp. 455–474.
CAVCAV-2019-DamianDMW
Communication-Closed Asynchronous Protocols (AD, CD, AM, JW), pp. 344–363.
ICSTICST-2019-ZhaoLWSH #framework #fuzzing #industrial #learning #named #perspective
SeqFuzzer: An Industrial Protocol Fuzzing Framework from a Deep Learning Perspective (HZ, ZL, HW, JS, YH), pp. 59–67.
ICTSSICTSS-2019-BombardaBGRDL #consistency #generative #refinement #state machine #testing #using
Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
VMCAIVMCAI-2019-AndreDFL #parametricity
Parametric Timed Broadcast Protocols (ÉA, BD, PF, DL), pp. 491–512.
FSCDFSCD-2018-Delaune #encryption #privacy
Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk) (SD), p. 21.
IFM-2018-DoughertyGR #analysis #security #smt #using
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
SEFMSEFM-2018-DuboisGPC #interactive #proving #theorem proving #using
Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
CoGVS-Games-2018-Lim #case study #using
Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
MoDELSMoDELS-2018-Rodriguez-Echeverria #framework #modelling #towards #visual notation
Towards a Language Server Protocol Infrastructure for Graphical Modeling (RRE, JLCI, MW, JC), pp. 370–380.
POPLPOPL-2018-SergeyWT #distributed #programming #proving
Programming and proving with distributed protocols (IS, JRW, ZT), p. 30.
SASSAS-2018-Shoham #decidability #distributed #interactive #logic #using #verification
Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
CCCC-2018-NeykovaHYA #api #distributed #f# #generative
A session type provider: compile-time API generation of distributed protocols with refinements in F# (RN, RH, NY, FA), pp. 128–138.
ESOPESOP-2018-RahliVVV #coq #fault tolerance #named
Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq (VR, IV, MV, PJEV), pp. 619–650.
FASEFASE-2018-LiuOSWGM #analysis #distributed #formal method #named #transaction
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis (SL0, PCÖ, KS, QW0, IG, JM), pp. 77–93.
CAVCAV-2018-BlondinEJ #analysis #named
Peregrine: A Tool for the Analysis of Population Protocols (MB, JE, SJ), pp. 604–611.
CAVCAV-2018-BauerCS0 #model checking #random #security
Model Checking Indistinguishability of Randomized Security Protocols (MSB, RC, APS, MV0), pp. 117–135.
VMCAIVMCAI-2018-JacobsS
Analyzing Guarded Protocols: Better Cutoffs, More Systems, More Expressivity (SJ, MS), pp. 247–268.
VMCAIVMCAI-2018-ZuckMT #probability #proving
P^5 : Planner-less Proofs of Probabilistic Parameterized Protocols (LDZ, KLM, JT), pp. 336–357.
IFM-2017-BruschiPGLP #case study #model checking #smt #verification
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study - (DB, ADP, SG, AL, EP), pp. 391–406.
ICFP-2017-Mainland #compilation #optimisation #semantics
Better living through operational semantics: an optimizing compiler for radio protocols (GM), p. 26.
OOPSLAOOPSLA-2017-CohenFL #memory management #performance
Efficient logging in non-volatile memory by exploiting coherency protocols (NC, MF, JRL), p. 24.
OOPSLAOOPSLA-2017-PadonLSS #decidability #distributed #reasoning
Paxos made EPR: decidable reasoning about distributed protocols (OP, GL, MS, SS), p. 31.
SASSAS-2017-OuadjaoutM #communication #markov #static analysis #using
Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
CASECASE-2017-LiuH #analysis #convergence
The convergence analysis of bat-inspired consensus protocols with nonlinear dynamics (QL, QH), pp. 1560–1565.
CASECASE-2017-WuXS #network #trust
Trust-based protocol for securing routing in opportunistic networks (XW, JX, JS), pp. 434–439.
CAVCAV-2017-SelyuninJNRHBNG #communication #monitoring #runtime
Runtime Monitoring with Recovery of the SENT Communication Protocol (KS, SJ, TN, CR, UH, EB, DN, RG), pp. 336–355.
FMFM-2016-LiSD #automation #security #verification
Automated Verification of Timed Security Protocols with Clock Drift (LL0, JS0, JSD), pp. 513–530.
MoDELSMoDELS-2016-BarnesCVP #communication #industrial #simulation #towards #verification
Towards the verification of industrial communication protocols through a simulation environment based on QEMU and systemC (CB, JMC, FV, AP), pp. 207–214.
MoDELSMoDELS-2016-Kosiuczenko #contract #on the #state machine #synthesis
On the synthesis of protocol state machines from contracts (PK), pp. 76–85.
ECOOPECOOP-2016-MilitaoAC
Composing Interfering Abstract Protocols (FM, JA, LC), p. 26.
OOPSLAOOPSLA-2016-WeitzWTEKT #scalability #smt #verification
Scalable verification of border gateway protocol configurations with an SMT solver (KW, DW, ET, MDE, AK, ZT), pp. 765–780.
PPDPPPDP-2016-KouzapasDPG
Typechecking protocols with Mungo and StMungo (DK, OD, RP, SJG), pp. 146–159.
VMCAIVMCAI-2016-AusserlechnerJK
Tight Cutoffs for Guarded Protocols with Fairness (SA, SJ, AK), pp. 476–494.
SIGMODSIGMOD-2015-0002KBDHKFG #coordination #program analysis #transaction
The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
ICPCICPC-2015-SunshineHA #api #usability
Searching the state space: a qualitative study of API protocol usability (JS, JDH, JA), pp. 82–93.
ICALPICALP-v1-2015-CzyzowiczGKKSU #convergence #on the
On Convergence and Threshold Properties of Discrete Lotka-Volterra Population Protocols (JC, LG, AK, EK, PGS, PU), pp. 393–405.
ICALPICALP-v2-2015-AlistarhG #polynomial
Polylogarithmic-Time Leader Election in Population Protocols (DA, RG), pp. 479–491.
FMFM-2015-BagheriKMJ #android #bound #design #detection #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FMFM-2015-FengHTZ #model checking #named #quantum #source code
QPMC: A Model Checker for Quantum Programs and Protocols (YF, EMH, AT, LZ), pp. 265–272.
FMFM-2015-LiSLD #security #verification
Verifying Parameterized Timed Security Protocols (LL, JS, YL, JSD), pp. 342–359.
SEFMSEFM-2015-Vanspauwen0 #encryption #implementation #library #specification #verification
Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications (GV, BJ), pp. 53–68.
CHICHI-2015-JacksonB #development #interactive #standard
Standards and/as Innovation: Protocols, Creativity, and Interactive Systems Development in Ecology (SJJ, SB), pp. 1769–1778.
HCIHCI-DE-2015-ChomaZB #communication #design #heuristic #usability
Communication of Design Decisions and Usability Issues: A Protocol Based on Personas and Nielsen’s Heuristics (JC, LAMZ, DB), pp. 163–174.
KDDKDD-2015-Pratt #machine learning #predict #proving
Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts (KBP), pp. 2049–2058.
SEKESEKE-2015-ChenZWQJW #api #mining
Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
ECOOPECOOP-2015-BurckhardtLPF #abstraction #robust #sequence
Global Sequence Protocol: A Robust Abstraction for Replicated Shared State (SB, DL, JP, MF), pp. 568–590.
PLDIPLDI-2015-MarrSD #metaprogramming #performance
Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
SACSAC-2015-GouthamLY #authentication #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-IvakiLA #reliability #taxonomy
A taxonomy of reliable request-response protocols (NI, NL, FA), pp. 456–463.
SACSAC-2015-RrushiFNHCP #specification
By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
CCCC-2015-NgCY #code generation
Protocols by Default — Safe MPI Code Generation Based on Session Types (NN, JGdFC, NY), pp. 212–232.
HPCAHPCA-2015-MenezoPG #energy #hybrid #performance #scalability
Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability (LGM, VP, JÁG), pp. 198–209.
ISMMISMM-2015-OsterlundL #concurrent #using
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
STOCSTOC-2015-BassilyS #performance
Local, Private, Efficient Protocols for Succinct Histograms (RB, ADS), pp. 127–135.
CAVCAV-2015-AlurRSTU #automation #distributed #symmetry
Automatic Completion of Distributed Protocols with Symmetry (RA, MR, CS, ST, AU), pp. 395–412.
TAPTAP-2015-GrinchteinCP #analysis #constraints #optimisation
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
FMFM-2014-BonakdarpourHK #authentication #automation #knowledge-based
Knowledge-Based Automated Repair of Authentication Protocols (BB, RH, SSK), pp. 132–147.
FMFM-2014-DuggiralaWMVM #modelling #parallel #precedence
Temporal Precedence Checking for Switched Models and Its Application to a Parallel Landing Protocol (PSD, LW, SM, MV, CAM), pp. 215–229.
IFMIFM-2014-BruniSNN #analysis #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-RamsdellDGR #analysis #hybrid #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
GRAPHITEGRAPHITE-2014-DelzannoRT #analysis
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
ICGTICGT-2014-Delzanno #distributed #model checking #verification
Parameterized Verification and Model Checking for Distributed Broadcast Protocols (GD), pp. 1–16.
CHICHI-2014-PikeMPSW #using
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
ICEISICEIS-v3-2014-LaraC #integration
A Protocol for Command and Control Systems Integration (PL, RC), pp. 484–489.
SEKESEKE-2014-CheMLC #network #online #runtime #testing
Testing Network Protocols: formally, at runtime and online (XC, SM, JL, ARC), pp. 90–93.
SEKESEKE-2014-DingSZ #development
Development of A Sliding Window Protocol for Data Synchronization in a Flow Cytometer (JD, YS, DZ), pp. 626–631.
SIGIRSIGIR-2014-CormackG #evaluation #overview
Evaluation of machine-learning protocols for technology-assisted review in electronic discovery (GVC, MRG), pp. 153–162.
ECOOPECOOP-2014-MilitaoAC
Rely-Guarantee Protocols (FM, JA, LC), pp. 334–359.
ECOOPECOOP-2014-PrincehouseCJBFS #architecture #composition #named
MiCA: A Compositional Architecture for Gossip Protocols (LP, RC, ZJ, KPB, NF, RS), pp. 644–669.
ECOOPECOOP-2014-SunshineHA #documentation #empirical #programming
Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming (JS, JDH, JA), pp. 157–181.
OOPSLAOOPSLA-2014-TuronVD #memory management #named #navigation
GPS: navigating weak memory with ghosts, protocols, and separation (AT, VV, DD), pp. 691–707.
AdaEuropeAdaEurope-2014-JaouenBPR
PDP 4PS : Periodic-Delayed Protocol for Partitioned Systems (AJ, EB, LP, TR), pp. 149–165.
LOPSTRLOPSTR-2014-TahatE #hybrid #self #synthesis #verification
A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
RERE-2014-MartinsO #analysis #case study #fault #functional #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
SACSAC-2014-Daniel #communication #using
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-HeimfarthGFA #latency #named
GB-MAC: a backbone based low latency protocol for WSNs (TH, JCG, AVF, JPdA), pp. 692–698.
SACSAC-2014-SantosBAP #health
Integrating IEEE 11073 and constrained application protocol for personal health devices (DFSS, FB, HOA, AP), pp. 466–467.
SACSAC-2014-SuzakiYTOS #testing #virtual machine
Rollback mechanism of nested virtual machines for protocol fuzz testing (KS, TY, AT, YO, ES), pp. 1484–1491.
SACSAC-2014-WenD #performance
Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
DATEDATE-2014-BalckGP #generative #modelling #testing #using
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-DijkR
Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
DATEDATE-2014-JaksicC #energy #how
DRAM-based coherent caches and how to take advantage of the coherence protocol to reduce the refresh energy (ZJ, RC), pp. 1–4.
DATEDATE-2014-NuzzoFIS #contract #cyber-physical #design #safety
Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
DATEDATE-2014-ZebeleinHFST #communication #modelling #multi
Model-based actor multiplexing with application to complex communication protocols (CZ, CH, JF, TS, JT), pp. 1–4.
HPCAHPCA-2014-ZhangBES #design #named #scalability #verification
PVCoherence: Designing flat coherence protocols for scalable verification (MZ, JDB, JE, DJS), pp. 392–403.
PDPPDP-2014-AtaeeG #named #performance #reliability #replication #streaming
EagleMacaw: A Dual-Tree Replication Protocol for Efficient and Reliable P2P Media Streaming (SA, BG), pp. 112–121.
PDPPDP-2014-BenzaidSB #network
An Enhanced Secure Pairwise Broadcast Time Synchronization Protocol in Wireless Sensor Networks (CB, AS, NB), pp. 569–573.
STOCSTOC-2014-HaitnerT
An almost-optimally fair three-party coin-flipping protocol (IH, ET), pp. 408–416.
STOCSTOC-2014-MillerS #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
TACASTACAS-2014-Ardeshir-LarijaniGN #concurrent #equivalence #quantum #verification
Verification of Concurrent Quantum Protocols by Equivalence Checking (EAL, SJG, RN), pp. 500–514.
ICSTICST-2014-JohanssonSLAG #fuzzing #modelling #named #robust #testing
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols (WJ, MS, UEL, MA, VG), pp. 323–332.
SMTSMT-2014-CarlssonGP #analysis #constraints #programming
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
VMCAIVMCAI-2014-JezequelE #algorithm #distributed #message passing #verification
Message-Passing Algorithms for the Verification of Distributed Protocols (LJ, JE), pp. 222–241.
ITiCSEITiCSE-2013-FeasterAZH #algorithm #education #network
Serious toys II: teaching networks, protocols, and algorithms (YF, FA, JZ, JOH), pp. 273–278.
ICALPICALP-v2-2013-ChretienCD #automaton #security
From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
IFMIFM-2013-MeryP #formal method #modelling #verification
Formal Modelling and Verification of Population Protocols (DM, MP), pp. 208–222.
SEFMSEFM-2013-OliveiraJW #csp #multi
A Verified Protocol to Implement Multi-way Synchronisation and Interleaving in CSP (MVMO, ISdMJ, JW), pp. 46–60.
HCIDUXU-PMT-2013-FebrettiLSJKW #component #evaluation #interface
A Component-Based Evaluation Protocol for Clinical Decision Support Interfaces (AF, KDL, JS, AEJ, GMK, DJW), pp. 232–241.
HCIHCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #safety #usability
Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
HCIHCI-IMT-2013-CarrinoRIKM #gesture
Gesture vs. Gesticulation: A Test Protocol (FC, AR, RI, OAK, EM), pp. 157–166.
CAiSECAiSE-2013-YuHGV #composition #framework #testing #web #web service
A Business Protocol Unit Testing Framework for Web Service Composition (JY, JH, SOG, SV), pp. 17–34.
PLDIPLDI-2013-UdupaRDMMA #named #specification
TRANSIT: specifying protocols with concolic snippets (AU, AR, JVD, SMH, MMKM, RA), pp. 287–296.
ICSEICSE-2013-InverardiT #automation #composition #synthesis
Automatic synthesis of modular connectors via composition of protocol mediation patterns (PI, MT), pp. 3–12.
SACSAC-2013-AllaniGP #hybrid #named
Hyphen: a hybrid protocol for generic overlay construction in P2P environments (MA, BG, PP), pp. 423–430.
SACSAC-2013-AnconaBM #consistency #dynamic analysis #multi
Constrained global types for dynamic checking of protocol conformance in multi-agent systems (DA, MB, VM), pp. 1377–1379.
SACSAC-2013-BrancoLR #bound #scalability
Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
SACSAC-2013-HoangLCMC #network
A backward-compatible protocol for inter-routing over heterogeneous overlay networks (GNH, LL, VC, PM, HNC), pp. 649–651.
SACSAC-2013-MartinaP #induction #multi #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
PDPPDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #using
Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
PDPPDP-2013-SchleyBR #fault
Fault Localizing End-to-End Flow Control Protocol for Networks-on-Chip (GS, NB, MR), pp. 454–461.
PDPPDP-2013-TemboNB #adaptation #clustering #distributed #problem #self #simulation
Distributed Iterative Solution of Numerical Simulation Problems on Infiniband and Ethernet Clusters via the P2PSAP Self-Adaptive Protocol (SRT, TTN, DEB), pp. 121–125.
PPoPPPPoPP-2013-DiouriGLC #energy #fault tolerance #towards
Towards an energy estimator for fault tolerance protocols (MeMD, OG, LL, FC), pp. 313–314.
PPoPPPPoPP-2013-LifflanderMK #detection #fault tolerance #termination
Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
FASEFASE-2013-BongiovanniH
A Mechanized Model for CAN Protocols (FB, LH), pp. 266–281.
TACASTACAS-2013-Ardeshir-LarijaniGN #equivalence #quantum
Equivalence Checking of Quantum Protocols (EAL, SJG, RN), pp. 478–492.
CADECADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #symmetry #unification
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAVCAV-2013-MeierSCB #analysis #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-SosnovichGN #network #security #using
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
ICTSSICTSS-2013-PellegrinoCM #developer #security
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
VMCAIVMCAI-2013-BiondiLMW #information management #random
Quantifying Information Leakage of Randomized Protocols (FB, AL, PM, AW), pp. 68–87.
IFMIFM-2012-GarisPCR #alloy #specification #state machine #uml
Specifying UML Protocol State Machines in Alloy (AGG, ACRP, AC, DR), pp. 312–326.
ICFPICFP-2012-LaunchburyDDA #multi #performance
Efficient lookup-table protocol in secure multiparty computation (JL, ISD, TD, AAM), pp. 189–200.
ICEISICEIS-v1-2012-BrzostowskiK #multi #performance
Efficient Multi-alternative Protocol for Multi-attribute Agent Negotiation (JB, RK), pp. 247–252.
ICEISICEIS-v2-2012-PradoFFFL #towards
Towards a Negotiation Protocol for ebXML (HAdP, EF, GJdLF, AHF, NCL), pp. 277–282.
CIKMCIKM-2012-JinCKLZ #query
A filter-based protocol for continuous queries over imprecise location data (YJ, RC, BK, KyL, YZ), pp. 365–374.
KEODKEOD-2012-HeardK #modelling #requirements
Modelling Agent Protocol Requirements (JH, RCK), pp. 335–338.
KRKR-2012-FelliGL #ltl #multi #specification
Synthesizing Agent Protocols From LTL Specifications Against Multiple Partially-Observable Environments (PF, GDG, AL).
ECMFAECMFA-2012-HamannHG #monitoring #ocl #runtime #state machine
OCL-Based Runtime Monitoring of Applications with Protocol State Machines (LH, OH, MG), pp. 384–399.
HILTHILT-2012-LiSRM #analysis #realtime #scheduling
Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
QAPLQAPL-2012-BelardinelliGL #automation #quantum #using #verification
Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
ICSEICSE-2012-PradelJAG #api #consistency #multi #specification
Statically checking API protocol conformance with mined multi-object specifications (MP, CJ, JA, TRG), pp. 925–935.
SACSAC-2012-NgWZ
Private data deduplication protocols in cloud storage (WKN, YW, HZ), pp. 441–446.
SACSAC-2012-RahmanA #authentication #named #network #robust
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
SACSAC-2012-SalaunEPBC #distributed #in the cloud #self #verification
Verification of a self-configuration protocol for distributed applications in the cloud (GS, XE, NDP, FB, TC), pp. 1278–1283.
SACSAC-2012-SalomoniMPM #named
S2S: a peer to peer protocol for participative sensing (PS, LAM, GP, MM), pp. 634–635.
SACSAC-2012-ZhangI #trust #web #web service #xml
An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
CASECASE-2012-WangHDS #agile #analysis #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
DATEDATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid
Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATEDATE-2012-QinM #automation #generative #testing
Automated generation of directed tests for transition coverage in cache coherence protocols (XQ, PM), pp. 3–8.
DATEDATE-2012-YangCJTZ #multi #smarttech
A multi-parameter bio-electric ASIC sensor with integrated 2-wire data transmission protocol for wearable healthcare system (GY, JC, FJ, HT, LRZ), pp. 443–448.
PDPPDP-2012-BroccoB #evaluation #framework #peer-to-peer
A Framework for a Comprehensive Evaluation of Ant-Inspired Peer-to-Peer Protocols (AB, IB), pp. 303–310.
PDPPDP-2012-GavaGP #algorithm #performance #security
Performance Evaluations of a BSP Algorithm for State Space Construction of Security Protocols (FG, MG, FP), pp. 170–174.
ESOPESOP-2012-ChadhaCK #automation #encryption #equivalence #verification
Automated Verification of Equivalence Properties of Cryptographic Protocols (RC, SC, SK), pp. 108–127.
ICSTICST-2012-ChrzaszczCST #evolution #testing
Testing of Evolving Protocols (JC, PC, AS, AT), pp. 901–906.
ICSTICST-2012-GansR #smarttech #testing
The SmartLogic Tool: Analysing and Testing Smart Card Protocols (GdKG, JdR), pp. 864–871.
ICSTICST-2012-Woehrle #network #search-based #testing
Search-Based Stress Testing of Wireless Network Protocol Stacks (MW), pp. 794–803.
ICTSSICTSS-2012-ChenV #testing
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
ICTSSICTSS-2012-HiromoriUYH #evaluation #performance #testing
Protocol Testing and Performance Evaluation for MANETs with Non-uniform Node Density Distribution (AH, TU, HY, TH), pp. 231–246.
IJCARIJCAR-2012-DelauneKP #constraints #security
Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
LICSLICS-2012-Vicary #quantum #semantics
Higher Semantics of Quantum Protocols (JV), pp. 606–615.
TAPTAP-2012-ArmandoPCMB #automation #model checking #security #testing
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap (AA, GP, RC, AM, DB), pp. 3–18.
VMCAIVMCAI-2012-ChatterjeeR #contract
Synthesizing Protocols for Digital Contract Signing (KC, VR), pp. 152–168.
CBSECBSE-2011-HeinzemannH #adaptation #architecture #communication #component #embedded #reuse #self
Reusing dynamic communication protocols in self-adaptive embedded component architectures (CH, SH), pp. 109–118.
QoSAQoSA-ISARCS-2011-FranksLH #metric #modelling #performance
Performance measurements and modeling of a java-based session initiation protocol (SIP) application server (GF, DHL, CEH), pp. 63–72.
WCREWCRE-2011-AntunesNV #network #reverse engineering
Reverse Engineering of Protocols from Network Traces (JA, NFN, PV), pp. 169–178.
WCREWCRE-2011-ScholzK #multi #source code #thread
Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
FMFM-2011-BoyerGS #configuration management #specification #verification
Specifying and Verifying the SYNERGY Reconfiguration Protocol with LOTOS NT and CADP (FB, OG, GS), pp. 103–117.
SEFMSEFM-2011-BorgstromHJRVPP #calculus
Broadcast Psi-calculi with an Application to Wireless Protocols (JB, SH, MJ, PR, BV, JÅP, JP), pp. 74–89.
CHICHI-2011-Freeman #eye tracking #usability #using
Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CSCWCSCW-2011-ShaoLLG #web
An operational transformation based synchronization protocol for web 2.0 applications (BS, DL, TL, NG), pp. 563–572.
HCIDUXU-v2-2011-Cai #assessment #human-computer #interactive
A Camera-Aided Legibility Assessment Protocol of Displays for Enhanced Human-Computer Interaction (HC), pp. 359–367.
HCIHIMI-v1-2011-Pavel #analysis #authentication #case study
Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
HCIHIMI-v1-2011-Pavel11a #approach #composition #design #security
An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
HCIHIMI-v1-2011-PavelJ #approach #authentication #design #logic
Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
HCIHIMI-v2-2011-BrandtLDBJ #communication
Flight Deck Workload and Acceptability of Verbal and Digital Communication Protocols (SLB, JL, AQVD, VB, WWJ), pp. 463–472.
KDIRKDIR-2011-BicegoFBCM #grid
An Innovative Protocol for Comparing Protein Binding Sites via Atomic Grid Maps (MB, ADF, PB, AC, VM), pp. 413–422.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #uml #using #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
ECOOPECOOP-2011-BeckmanKA #empirical
An Empirical Study of Object Protocols in the Wild (NEB, DK, JA), pp. 2–26.
PLATEAUPLATEAU-2011-JaspanA #developer #empirical
Are object protocols burdensome?: an empirical study of developer forums (CJ, JA), pp. 51–56.
PEPMPEPM-2011-WangG #embedded #programming
An embedded language for programming protocol stacks in embedded systems (YW, VG), pp. 63–72.
POPLPOPL-2011-SchwarzSVLM #source code #static analysis
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol (MDS, HS, VV, PL, MMO), pp. 93–104.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #unification #using
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
SACSAC-2011-LiuWYL #modelling #scalability
Scalable CP-nets modeling for BitTorrent protocol (JL, HW, XY, JL), pp. 542–543.
SACSAC-2011-MacielH #commit #rest
Extending timestamp-based two phase commit protocol for RESTful services to meet business rules (LAHdSM, CMH), pp. 778–785.
SACSAC-2011-MunizL #encryption #on the #recognition
On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
SACSAC-2011-OuederniSP #interactive
Measuring the compatibility of service interaction protocols (MO, GS, EP), pp. 1560–1567.
DATEDATE-2011-GoswamiSC #communication #cyber-physical #hybrid #re-engineering
Re-engineering cyber-physical control applications for hybrid communication protocols (DG, RS, SC), pp. 914–919.
HPCAHPCA-2011-VantreaseLB
Atomic Coherence: Leveraging nanophotonics to build race-free cache coherence protocols (DV, MHL, NLB), pp. 132–143.
HPDCHPDC-2011-AhujaBFGS #modelling
Introspective end-system modeling to optimize the transfer time of rate based protocols (VA, AB, MKF, DG, GS), pp. 61–72.
PDPPDP-2011-Berbecaru #authentication #mobile #named
LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments (DB), pp. 141–145.
PDPPDP-2011-YangSMKS #fault tolerance
Comparing and Refining Gossip Protocols for Fault Tolerance in Wireless P2P Systems (JY, TS, CM, DK, KUS), pp. 595–599.
STOCSTOC-2011-Goyal #constant #using
Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
STOCSTOC-2011-Woodruff #approximate #black box
Near-optimal private approximation protocols via a black box transformation (DPW), pp. 735–744.
TACASTACAS-2011-RavnSV #modelling #process #verification #web #web service
Modelling and Verification of Web Services Business Activity Protocol (APR, JS, SV), pp. 357–371.
CADECADE-2011-ArnaudCD #recursion #security #testing
Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
ICSTICST-2011-DadeauHK #generative #security #testing
Mutation-Based Test Generation from Security Protocols in HLPSL (FD, PCH, RK), pp. 240–248.
VLDBVLDB-2010-ChenOZ #adaptation #database
An Adaptive Updating Protocol for Reducing Moving Object Databases Workload (SC, BCO, ZZ), pp. 735–746.
SEFMSEFM-2010-BenettiMV #ad hoc #model checking #network
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA (DB, MM, LV), pp. 191–202.
CHICHI-2010-Olmsted-HawalaMHA #comparison #testing #usability #web
Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability (ELOH, EDM, SH, KTA), pp. 2381–2390.
CIKMCIKM-2010-RonenS10a #concurrent #network #social
Concurrent atomic protocols for making and changing decisions in social networks (RR, OS), pp. 1337–1340.
SEKESEKE-2010-Bouabana-TebibelGM #ad hoc
Secure ad-hoc routing protocol (TBT, RNG, SM), pp. 771–776.
PADLPADL-2010-WangG #approach #domain-specific language #implementation #stack
A Domain-Specific Language Approach to Protocol Stack Implementation (YW, VG), pp. 183–185.
POPLPOPL-2010-BhargavanFG #composition #security #type system #verification
Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
SACSAC-2010-CostaMB #consistency #database #distributed #mobile
A distributed protocol for ensuring replicated database consistency in mobile computing environments (AC, JMM, AB), pp. 1688–1693.
SACSAC-2010-HoqueRA #named #scalability #using
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-JungCKCGK #interface #multi #network #stack
Virtual protocol stack interface for multiple wireless sensor network simulators (JJ, YC, YK, YC, BG, JK), pp. 240–241.
SACSAC-2010-SenguptaMS #multi #named #network
MMSRP: multi-wavelength Markov-based split reservation protocol for DWDM optical networks (MS, SKM, DS), pp. 689–693.
DATEDATE-2010-CaoN #markov
High-fidelity markovian power model for protocols (JC, AN), pp. 267–270.
HPCAHPCA-2010-RomanescuLSB
UNified Instruction/Translation/Data (UNITD) coherence: One protocol to rule them all (BFR, ARL, DJS, AB), pp. 1–12.
PDPPDP-2010-BazN #adaptation #communication #distributed #performance #self
A Self-adaptive Communication Protocol with Application to High Performance Peer to Peer Distributed Computing (DEB, TTN), pp. 327–333.
PDPPDP-2010-EbrahimiDLT #multi #named #novel
HAMUM — A Novel Routing Protocol for Unicast and Multicast Traffic in MPSoCs (ME, MD, PL, HT), pp. 525–532.
PPoPPPPoPP-2010-HoeflerSL #communication #scalability
Scalable communication protocols for dynamic sparse data exchange (TH, CS, AL), pp. 159–168.
TACASTACAS-2010-AvnitSP #automation #named #synthesis
ACS: Automatic Converter Synthesis for SoC Bus Protocols (KA, AS, JP), pp. 343–348.
CSLCSL-2010-BasinC #security
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
ICSTICST-2010-PorresR #contract #nondeterminism #uml
From Nondeterministic UML Protocol Statemachines to Class Contracts (IP, IR), pp. 107–116.
ICTSSICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #using
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
DocEngDocEng-2009-BoyerWA #documentation #interactive #rest #web
A REST protocol and composite format for interactive web documents (JMB, CW, RPA), pp. 139–148.
ICDARICDAR-2009-SlimaneIKAH #database #evaluation #image
A New Arabic Printed Text Image Database and Evaluation Protocols (FS, RI, SK, AMA, JH), pp. 946–950.
SIGITESIGITE-2009-Cross #using
Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
SIGITESIGITE-2009-OhMP #education #encryption #internet #simulation #using
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
CIAACIAA-2009-CaoN #case study
Formally Synthesising a Protocol Converter: A Case Study (JC, AN), pp. 249–252.
ICALPICALP-v2-2009-ChatzigiannakisMS
Mediated Population Protocols (IC, OM, PGS), pp. 363–374.
FMFM-2009-HeidarianSV #analysis #network
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
RTARTA-2009-BursucC #algebra #bound #security
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
RTARTA-2009-SeidlV
Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (HS, KNV), pp. 118–132.
SEFMSEFM-2009-AndresMN #testing
Applying Formal Passive Testing to Study Temporal Properties of the Stream Control Transmission Protocol (CA, MGM, MN), pp. 73–82.
SEFMSEFM-2009-LienO #analysis #formal method #modelling #multi
Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
HaskellHaskell-2009-PikeBG #embedded #experience #haskell #realtime
Roll your own test bed for embedded real-time protocols: a haskell experience (LP, GMB, AG), pp. 61–68.
CHICHI-2009-MankowskiBSS #behaviour #canonical
Finding canonical behaviors in user protocols (WCM, PB, AS, DDS), pp. 1323–1326.
HCIHCI-AUII-2009-ZarraonandiaVDA #learning
A Virtual Environment for Learning Aiport Emergency Management Protocols (TZ, MRRV, PD, IA), pp. 228–235.
HCIHCI-VAD-2009-ChisnellBLL #usability
Usability for Poll Workers: A Voting System Usability Test Protocol (DC, KB, SJL, SL), pp. 458–467.
HCIHIMI-DIE-2009-LeeKSC #framework #multi
A Framework for Fairness Guaranteed Multi-streaming Transport Protocol (WL, HK, DWS, JC), pp. 553–562.
HCIHIMI-II-2009-KimMC #clustering #network #using
A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
ECOOPECOOP-2009-BierhoffBA #api
Practical API Protocol Checking with Access Permissions (KB, NEB, JA), pp. 195–219.
ESEC-FSEESEC-FSE-2009-BertolinoIPT #automation #behaviour #composition #synthesis
Automatic synthesis of behavior protocols for composable web-services (AB, PI, PP, MT), pp. 141–150.
SACSAC-2009-CavalliMO #approach #consistency #testing
A passive conformance testing approach for a MANET routing protocol (ARC, SM, EMdO), pp. 207–211.
SACSAC-2009-HoqueRA #authentication #privacy #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-Hurlin #parallel #specification #thread
Specifying and checking protocols of multithreaded classes (CH), pp. 587–592.
SACSAC-2009-KerschbaumDSB #communication #complexity #multi #on the
On the practical importance of communication complexity for secure multi-party computation protocols (FK, DD, AS, DB), pp. 2008–2015.
SACSAC-2009-KokashCRI #flexibility #network
A flexible QoS-aware routing protocol for infrastructure-less B3G networks (NK, RSC, PGR, VI), pp. 212–216.
SACSAC-2009-OliveiraA #named
NECTAR: a DTN routing protocol based on neighborhood contact history (ECRdO, CVNdA), pp. 40–46.
SACSAC-2009-PassitoMM #analysis #network #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-ReinkeHNGLL #network #standard #transaction
Integrating standardized transaction protocols in service-oriented wireless sensor networks (CR, NH, JN, SG, VL, ML), pp. 2202–2203.
SACSAC-2009-ZaidiBC #network #testing
Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
CASECASE-2009-ChavanZK #authentication
A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
DATEDATE-2009-AvnitS #approach #design #formal method
A formal approach to design space exploration of protocol converters (KA, AS), pp. 129–134.
DATEDATE-2009-EbrahimiDNMAPT #multi
An efficent dynamic multicast routing protocol for distributing traffic in NOCs (ME, MD, MHN, SM, AAK, JP, HT), pp. 1064–1069.
DATEDATE-2009-FourmigueGNA #design #framework
Co-simulation based platform for wireless protocols design explorations (AF, BG, GN, EMA), pp. 874–877.
DATEDATE-2009-LiNZGSS #dependence #optimisation
Optimizations of an application-level protocol for enhanced dependability in FlexRay (WL, MDN, WZ, PG, ALSV, SAS), pp. 1076–1081.
DATEDATE-2009-MollCRB #modelling #performance #using
Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATEDATE-2009-SinhaRBS #design #multi #using
Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATEDATE-2009-ZiermannWT #network
CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16× higher data rates (TZ, SW, JT), pp. 1088–1093.
PDPPDP-2009-Payeras-CapellaPFR #email #performance
No Author Based Selective Receipt in an Efficient Certified E-mail Protocol (MPC, MMP, JLFG, LHiR), pp. 387–392.
WRLAWRLA-2008-RiescoV09 #implementation #maude
Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol (AR, AV), pp. 249–266.
ESOPESOP-2009-KikuchiK #authentication #automation #encryption #type system #verification
Type-Based Automated Verification of Authenticity in Cryptographic Protocols (DK, NK), pp. 222–236.
FoSSaCSFoSSaCS-2009-Guttman #authentication #composition #encryption #testing
Cryptographic Protocol Composition via the Authentication Tests (JDG), pp. 303–317.
CADECADE-2009-CiobacaDK #convergence #equation #security
Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
CAVCAV-2009-AbadiBC #modelling #proving #security
Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
VMCAIVMCAI-2009-Cortier #security #verification
Verification of Security Protocols (VC), pp. 5–13.
CBSECBSE-2008-BothZ #automation #component #consistency #parallel #recursion
Automatic Protocol Conformance Checking of Recursive and Parallel Component-Based Systems (AB, WZ), pp. 163–179.
WICSAWICSA-2008-LiFWWJ #approach #development
A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation (XL, YF, JW, LW, FJ), pp. 137–146.
ICALPICALP-C-2008-HallgrenKSZ #quantum #verification
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
FMFM-2008-GrandyBSSR #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
FMFM-2008-RidgeNS #approach #implementation #network
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service (TR, MN, PS), pp. 294–309.
SEFMSEFM-2008-Salaun #generative #specification
Generation of Service Wrapper Protocols from Choreography Specifications (GS), pp. 313–322.
SEFMSEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #using
Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
CAiSECAiSE-2008-SerrourGKB #correlation #interactive
Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
EDOCEDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #using
Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEISICEIS-DISI-2008-HuangG #api #documentation #xml
A Locking Protocol for DOM API on XML Documents (YFH, MLG), p. 105–?.
ICEISICEIS-ISAS2-2008-KiyomotoOT #automation #generative #on the fly #security
On-the-Fly Automatic Generation of Security Protocols (SK, HO, TT), pp. 97–104.
ICEISICEIS-ISAS2-2008-TobarraCPC #verification
Formal Verification of the Secure Sockets Layer Protocol (MLT, DC, JJP, FC), pp. 246–252.
ICEISICEIS-SAIC-2008-BaguesBBGI #communication #semantics #using
Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEISICEIS-SAIC-2008-VallejoCAG #communication #e-commerce #standard
Integrating a Standard Communication Protocol into an E-Commerce Environment Based on Intelligent Agents (DV, JJCS, JA, CGM), pp. 55–60.
SEKESEKE-2008-DaiS #online
QuickPay Online Payment Protocol (JD, MS), pp. 223–226.
SEKESEKE-2008-DuffyHM #c++ #comprehension #evolution #interface #library #reverse engineering #scalability
Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks (EBD, JOH, BAM), pp. 303–308.
SEKESEKE-2008-LiuLZL #logic #security
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
OOPSLAOOPSLA-2008-GopinathanR #analysis #runtime
Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
SASSAS-2008-RamanathanSGJ #using
Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
ICSEICSE-2008-ReichertKSMH #analysis #network
A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
ICSEICSE-2008-XiaoLG #distributed #security
Developing a security protocol for a distributed decision support system in a healthcare environment (LX, PHL, AG), pp. 673–682.
SACSAC-2008-AndronickN #embedded
Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
SACSAC-2008-Armendariz-InigoMMM #database #named #replication
SIPRe: a partial database replication protocol with SI replicas (JEAI, AMG, JRGdM, FDME), pp. 2181–2185.
SACSAC-2008-MaagG #approach #self #testing #using
Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SACSAC-2008-SaffarianM #algorithm #novel
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
CASECASE-2008-LiuWJ
A geographic source routing protocol for traffic sensing in urban environment (LL, ZW, WKJ), pp. 347–352.
CASECASE-2008-ScheitererNOSG #performance #precise
Synchronization performance of the Precision Time Protocol in the face of slave clock frequency drift (RLS, CN, DO, GS, DG), pp. 554–559.
DACDAC-2008-ReshadiGG #case study #design #internet
C-based design flow: a case study on G.729A for voice over internet protocol (VoIP) (MR, BG, DG), pp. 72–75.
DATEDATE-2008-AvnitDSRP #approach #formal method #problem
A Formal Approach To The Protocol Converter Problem (KA, VD, AS, SR, SP), pp. 294–299.
DATEDATE-2008-FranchinoBF
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme (GF, GCB, TF), pp. 1051–1056.
DATEDATE-2008-GailliardBSV #component #corba #semantics
Mapping Semantics of CORBA IDL and GIOP to Open Core Protocol for Portability and Interoperability of SDR Waveform Components (GG, HB, MS, FV), pp. 330–335.
DATEDATE-2008-Lotfi-KamranDLN
BARP-A Dynamic Routing Protocol for Balanced Distribution of Traffic in NoCs (PLK, MD, CL, ZN), pp. 1408–1413.
PDPPDP-2008-KaropoulosKG #privacy
Privacy Protection in Context Transfer Protocol (GK, GK, SG), pp. 590–596.
PDPPDP-2008-LiZLX #adaptation #named #self
SAP2P: Self-adaptive and Locality-aware P2P Membership Protocol for Heterogeneous Systems (ZL, ZZ, ZL, GX), pp. 229–236.
TACASTACAS-2008-FismanKL #distributed #fault tolerance #on the #verification
On Verifying Fault Tolerance of Distributed Protocols (DF, OK, YL), pp. 315–331.
TACASTACAS-2008-SaksenaWJ #ad hoc #graph grammar #modelling #verification
Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols (MS, OW, BJ), pp. 18–32.
CAVCAV-2008-BackesLMP #abstraction #analysis #security
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
CAVCAV-2008-Cremers #analysis #security #verification
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
ICSTICST-2008-GrieskampKMNSW #assurance #documentation #modelling #quality
Model-Based Quality Assurance of Windows Protocol Documentation (WG, NK, DM, AN, KS, FLW), pp. 502–506.
IJCARIJCAR-2008-Comon-Lundh #automation #challenge #security #verification
Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
IJCARIJCAR-2008-KremerMT #proving
Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
VMCAIVMCAI-2008-DimitrovaP #abstraction #lazy evaluation #question
Is Lazy Abstraction a Decision Procedure for Broadcast Protocols? (RD, AP), pp. 98–111.
HTHT-2007-AgarwalCKNR #named
HSTP: hyperspeech transfer protocol (SKA, DC, AK, AAN, NR), pp. 67–76.
SIGITESIGITE-2007-YuanZ #linux #student
Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocols (DY, JZ), pp. 271–272.
CSMRCSMR-2007-Quante07a #comprehension #graph #process
Dynamic Object Process Graph Extraction for Program Understanding and Protocol Recovery (JQ), pp. 345–348.
WCREWCRE-2007-QuanteK
Dynamic Protocol Recovery (JQ, RK), pp. 219–228.
WCREWCRE-2007-ShevertalovM #reverse engineering
A Reverse Engineering Tool for Extracting Protocols of Networked Applications (MS, SM), pp. 229–238.
IFMIFM-2007-FehnkerHM #modelling #network #verification
Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks (AF, LvH, AM), pp. 253–272.
IFMIFM-2007-OostdijkRTVW #encryption #learning #testing #verification
Integrating Verification, Testing, and Learning for Cryptographic Protocols (MO, VR, JT, RGdV, TACW), pp. 538–557.
SEFMSEFM-2007-AichernigPWW #consistency #formal method #industrial #testing
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
SEFMSEFM-2007-GrandyBSR #encoding #named #security
ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
SEFMSEFM-2007-Hameurlain #behaviour #component #flexibility #specification
Flexible Behavioural Compatibility and Substitutability for Component Protocols: A Formal Specification (NH), pp. 391–400.
SEFMSEFM-2007-SahaRC #modelling #using #verification
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
LISPILC-2007-CottonB
A metaobject protocol for CLforJava (JC, JB), p. 9.
HCIHCI-AS-2007-YiJ #analysis #approach #online
The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
HCIOCSC-2007-MaAL #authentication
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
CAiSECAiSE-2007-HamadiPB #concept #modelling #privacy #web #web service
Conceptual Modeling of Privacy-Aware Web Service Protocols (RH, HYP, BB), pp. 233–248.
SEKESEKE-2007-XuXW #automation #code generation #state machine #uml
Automated Test Code Generation from UML Protocol State Machines (DX, WX, WEW), pp. 99–104.
QAPLQAPL-2007-Smith #communication #modelling #probability #source code
Stochastic Modelling of Communication Protocols from Source Code (MJAS), pp. 129–145.
ESEC-FSEESEC-FSE-2007-Hanna #implementation #lightweight #named #network #security #verification
SLEDE: lightweight verification of sensor network security protocol implementations (YH), pp. 591–594.
ICSEICSE-2007-RamanathanGJ #precedence
Path-Sensitive Inference of Function Precedence Protocols (MKR, AG, SJ), pp. 240–250.
ICSEICSE-2007-SkogsrudBCT #security
Managing Impacts of Security Protocol Changes in Service-Oriented Applications (HS, BB, FC, FT), pp. 468–477.
SACSAC-2007-Armendariz-InigoJMDM #bound #database #flexibility #replication
k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
SACSAC-2007-FuL #effectiveness
An effective kNN search protocol in wireless broadcast environments (SYF, CML), pp. 925–929.
SACSAC-2007-JunJ #ad hoc #automation #mobile #network
Automated routing protocol selection in mobile ad hoc networks (TJ, CJ), pp. 906–913.
SACSAC-2007-KanzakiHN #ad hoc #mobile #network #performance
An efficient TDMA slot assignment protocol in mobile ad hoc networks (AK, TH, SN), pp. 891–895.
SACSAC-2007-KarmakarG #adaptation #distributed
Adaptive broadcast by distributed protocol switching (SK, AG), pp. 588–589.
SACSAC-2007-Kofron #behaviour #component #using
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SACSAC-2007-Li #abstraction #parametricity #proving #verification
Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols (YL), pp. 1534–1535.
SACSAC-2007-LongoG
A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
SACSAC-2007-WuIOKM #adaptation #peer-to-peer #random
An adaptive randomized search protocol in peer-to-peer systems (YW, TI, FO, HK, TM), pp. 533–537.
SACSAC-2007-YanWZ #ad hoc #mobile #network
Dual agreement virtual subnet protocol for mobile ad-hoc networks (KQY, SCW, GYZ), pp. 953–954.
DACDAC-2007-BhojwaniM #concurrent #online #robust
A Robust Protocol for Concurrent On-Line Test (COLT) of NoC-based Systems-on-a-Chip (PB, RNM), pp. 670–675.
DATEDATE-2007-GburzynskiKO #ad hoc #low cost #network #performance
A tiny and efficient wireless ad-hoc protocol for low-cost sensor networks (PG, BK, WO), pp. 1557–1562.
DATEDATE-2007-MamagkakisSC #design #middleware #optimisation
Middleware design optimization of wireless protocols based on the exploitation of dynamic input patterns (SM, DS, FC), pp. 1036–1041.
HPCAHPCA-2007-ChengCD #adaptation
An Adaptive Cache Coherence Protocol Optimized for Producer-Consumer Sharing (LC, JBC, DD), pp. 328–339.
HPCAHPCA-2007-PascualGAD #architecture #fault tolerance
A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures (RFP, JMG, MEA, JD), pp. 157–168.
PDPPDP-2007-CuestaRD #effectiveness
An Effective Starvation Avoidance Mechanism to Enhance the Token Coherence Protocol (BC, AR, JD), pp. 47–54.
PDPPDP-2007-FlorioB #detection
A Tool for the Expression of Failure Detection Protocols (VDF, CB), pp. 199–204.
PDPPDP-2007-MastroianniTV #grid #information management #resource management
Evaluating Resource Discovery Protocols for Hierarchical and Super-Peer Grid Information Systems (CM, DT, OV), pp. 147–154.
PDPPDP-2007-OrtizODP #simulation
Analyzing the benefits of protocol offload by full-system simulation (AO, JO, AFD, AP), pp. 229–237.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #reachability #using #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
FASEFASE-2007-SanchezSM #concurrent #distributed #product line
A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces (CS, HBS, ZM), pp. 155–169.
STOCSTOC-2007-AndrewsJS #network #scheduling
Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads (MA, KJ, ALS), pp. 145–154.
TACASTACAS-2007-DoghmiGT #encryption
Searching for Shapes in Cryptographic Protocols (SFD, JDG, FJT), pp. 523–537.
LICSLICS-2007-KahlerKT #encryption #infinity #model checking
Infinite State AMC-Model Checking for Cryptographic Protocols (DK, RK, TT), pp. 181–192.
FATESTestCom-FATES-2007-GrepetM #ad hoc #self
Nodes Self-similarity to Test Wireless Ad Hoc Routing Protocols (CG, SM), pp. 123–137.
FATESTestCom-FATES-2007-LuukkalaO #embedded #modelling #testing
Model Based Testing of an Embedded Session and Transport Protocol (VL, IO), pp. 212–227.
TPDLECDL-2006-AhmadGS #concept #education #library #resource management
Concept Space Interchange Protocol: A Protocol for Concept Map Based Resource Discovery in Educational Digital Libraries (FA, QG, TS), pp. 471–476.
TPDLECDL-2006-SfakakisK #graph #semantics
A Semantics-Based Graph for the Bib-1 Access Points of the Z39.50 Protocol (MS, SK), pp. 445–448.
VLDBVLDB-2006-HausteinHL #contest #xml
Contest of XML Lock Protocols (MPH, TH, KL), pp. 1069–1080.
ITiCSEITiCSE-2006-DairaineEJCTL #named #network
IREEL: remote experimentation with real protocols and applications over emulated network (LD, EE, GJ, PC, FT, EL), p. 314.
ICALPICALP-v2-2006-BalabanPZ #distributed #safety
Invisible Safety of Distributed Protocols (IB, AP, LDZ), pp. 528–539.
ICALPICALP-v2-2006-DelauneLLT #analysis #morphism
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
ICALPICALP-v2-2006-KahlerKW
A Dolev-Yao-Based Definition of Abuse-Free Protocols (DK, RK, TW), pp. 95–106.
FMFM-2006-LangariT #communication #formal method #graph transformation #modelling
Formal Modeling of Communication Protocols by Graph Transformation (ZL, RJT), pp. 348–363.
FMFM-2006-Pavlovic #development
Connector-Based Software Development: Deriving Secure Protocols (DP), pp. 598–599.
FMFM-2006-UmenoL #automaton #case study #proving #safety #theorem proving #using
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
RTARTA-2006-Turuani
The CL-Atse Protocol Analyser (MT), pp. 277–286.
SEFMSEFM-2006-NguyenS #aspect-oriented
VPA-Based Aspects: Better Support for AOP over Protocols (DHN, MS), pp. 167–176.
SEFMSEFM-2006-RamsokulS #framework #modelling #named #verification #web service
ASEHA: A Framework for Modelling and Verification ofWeb Services Protocols (PR, AS), pp. 196–205.
ICEISICEIS-SAIC-2006-BrzezinskiKK #mobile #safety
Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee (JB, AK, JK), pp. 118–123.
ICPRICPR-v3-2006-Haralick06a #testing
Testing The Torah Code Hypothesis: The Experimental Protocol (RMH), pp. 110–115.
SEKESEKE-2006-UbayashiTSMM #aspect-oriented #collaboration #metamodelling #modelling
Aspect-Oriented and Collaborative Systems Metamodel Access Protocols for Extensible Aspect-Oriented Modeling (NU, TT, SS, YM, SM), pp. 4–10.
SEKESEKE-2006-ZhangYLC #formal method #game studies #novel
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization (LZ, JY, ML, JC), pp. 410–415.
AdaEuropeAdaEurope-2006-UruenaZBPP #communication #distributed #realtime
The Arbitrated Real-Time Protocol (AR-TP): A Ravenscar Compliant Communication Protocol for High-Integrity Distributed Systems (SU, JZ, DB, JAP, JAdlP), pp. 215–226.
QAPLQAPL-2006-AdaoMRV #analysis #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
QAPLQAPL-2006-ZhangH #analysis #formal method #streaming
Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
SACSAC-2006-AsplundN #consistency #maintenance
Post-partition reconciliation protocols for maintaining consistency (MA, SNT), pp. 710–717.
SACSAC-2006-Gutierrez-NolascoVT #interactive #semantics
A semantic model for safe protocol interaction (SGN, NV, CLT), pp. 1599–1600.
SACSAC-2006-HeatherS #analysis #infinity #security
To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
SACSAC-2006-Lo #smt
Data sharing protocols for SMT processors (SWL), pp. 891–895.
SACSAC-2006-PhanTB #benchmark #metric #mobile #performance
A benchmark on soap’s transport protocols performance for mobile applications (TKAP, ZT, PB), pp. 1139–1144.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #set #using
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-RuttiWS #abstraction #implementation #interface
Service interface: a new abstraction for implementing and composing protocols (OR, PTW, AS), pp. 691–696.
DACDAC-2006-GoraiBBTM #verification
Directed-simulation assisted formal verification of serial protocol and bridge (SG, SB, LB, PT, RSM), pp. 731–736.
DATEDATE-2006-Shrikumar
40Gbps de-layered silicon protocol engine for TCP record (HS), pp. 188–193.
DATEDATE-DF-2006-ZarriCDMPRT #on the #verification
On the verification of automotive protocols (GZ, FC, FD, RM, MP, GR, CT), pp. 195–200.
OSDIOSDI-2006-CowlingMLRS #fault tolerance #hybrid #replication
HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance (JAC, DSM, BL, RR, LS), pp. 177–190.
PDPPDP-2006-GarciaHL #communication #petri net #using #validation
Validation of a Protocol for Communication Management in CSCW Systems Using a Coloured-Petri Net Modelization (ÉG, JH, JCL), pp. 272–275.
PDPPDP-2006-GhafoorYDM #calculus #exception
p_RBT-calculus Compensation and Exception Handling Protocol (AGM, JY, JD, MMuR), pp. 39–47.
PDPPDP-2006-WuCYR #ad hoc #mobile #network
A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks (WW, JC, JY, MR), pp. 64–72.
PPoPPPPoPP-2006-SurJCP #design
RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits (SS, HWJ, LC, DKP), pp. 32–39.
FoSSaCSFoSSaCS-2006-ZuninoD #analysis
Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
STOCSTOC-2006-Antonakopoulos #bound #performance
Fast leader-election protocols with bounded cheaters’ edge (SA), pp. 187–196.
STOCSTOC-2006-KushilevitzLR #composition #security
Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
TACASTACAS-2006-BrownP #verification
Easy Parameterized Verification of Biphase Mark and 8N1 Protocols (GMB, LP), pp. 58–72.
LICSLICS-2006-Gordon #implementation #security
Provable Implementations of Security Protocols (ADG), pp. 345–346.
ICTSSTestCom-2006-ShuL #monitoring #security #testing
Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
ICTSSTestCom-2006-SubramaniamP #testing
Analyzing the Impact of Protocol Changes on Tests (MS, ZP), pp. 197–212.
CBSECBSE-2005-LiuG #performance #predict #using
Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
JCDLJCDL-2005-KyrillidouG #evaluation #library
Developing the DigiQUAL protocol for digital library evaluation (MK, SG), pp. 172–173.
ITiCSEITiCSE-2005-CrescenziGI #ide #network #visualisation
NetPrIDE an integrated environment for developing and visualizing computer network protocols (PC, GG, GI), pp. 306–310.
ICALPICALP-2005-DattaDMST #logic #polynomial #probability #security #semantics
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (AD, AD, JCM, VS, MT), pp. 16–29.
ICALPICALP-2005-MoranN #encryption
Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
FMFM-2005-LeiI #approach #communication
An Approach to Unfolding Asynchronous Communication Protocols (YL, SPI), pp. 334–349.
IFMIFM-2005-KristensenWN #ad hoc #mobile #modelling #network #prototype
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks (LMK, MW, PCN), pp. 266–286.
SEFMSEFM-2005-Hameurlain #behaviour #component #on the
On Compatibility and Behavioural Substitutability of Component Protocols (NH), pp. 394–403.
SEFMSEFM-2005-SubramaniamS #using
Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
ICEISICEIS-v4-2005-SannaVPM #communication #lightweight #mobile
Lightweight Client-Pull Protocol for Mobile Communication (SS, EDV, AP, CM), pp. 227–231.
ICEISICEIS-v4-2005-TawbiBC #communication #development #framework #web
A Framework for Web Applications Development: A SOAP Based Communication Protocol (ST, JPB, BC), pp. 82–89.
SEKESEKE-2005-Shen #interactive
The Service Interaction Protocol for the Chronobot/Virtual Classroom (CVC) System (MS), pp. 16–18.
QAPLQAPL-2004-AldiniP05 #analysis #on the #probability
On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
QAPLQAPL-2004-BodeiCDBNNP05 #evaluation #performance #security
Performance Evaluation of Security Protocols Specified in LySa (CB, MC, PD, MB, FN, HRN, CP), pp. 167–189.
QAPLQAPL-2004-LanotteMT05 #analysis #automation
Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
AdaEuropeAdaEurope-2005-MartinezH #communication #named #realtime #standard
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet (JMM, MGH), pp. 180–195.
LOPSTRLOPSTR-2005-PettorossiPS #array #using #verification
Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
PPDPPPDP-2005-CortierRZ #encryption #verification
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
PPDPPPDP-2005-Mitchell #analysis #logic #network #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
ASEASE-2005-CouchotGK #approach #deduction #safety
A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
ICSEICSE-2005-BeekMLGFS #automation #case study #verification
A case study on the automated verification of groupware protocols (MHtB, MM, DL, SG, AF, MS), pp. 596–603.
SACSAC-2005-BarrettEKMS #ad hoc #multi #network #probability
Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios (CLB, SE, LK, MVM, JPS), pp. 1166–1173.
SACSAC-2005-ByunS #communication #development
A pattern-based development methodology for communication protocols (YB, BAS), pp. 1524–1528.
SACSAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #realtime #set #validation
An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
SACSAC-2005-KanzakiHN #ad hoc #adaptation #network
An adaptive TDMA slot assignment protocol in ad hoc sensor networks (AK, TH, SN), pp. 1160–1165.
SACSAC-2005-SerranoO #framework #interactive #recursion #semantics #specification
A semantic framework for the recursive specification of interaction protocols (JMS, SO), pp. 451–456.
SACSAC-2005-Strangio #performance
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
DATEDATE-2005-GhoshG #distributed #locality #named #network #scheduling
LORD: A Localized, Reactive and Distributed Protocol for Node Scheduling in Wireless Sensor Networks (AG, TG), pp. 190–195.
DATEDATE-2005-VerleMAMA #optimisation #power management
Low Power Oriented CMOS Circuit Optimization Protocol (AV, XM, NA, PM, DA), pp. 640–645.
HPDCHPDC-2005-KarmonLS #distributed #named #performance
GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
PDPPDP-2005-CalafateMM #ad hoc #interactive #mobile #network #on the
On the Interaction Between IEEE 802.11e and Routing Protocols in Mobile Ad-Hoc Networks (CMTC, PM, MPM), pp. 110–117.
PDPPDP-2005-Castro-CompanyIGM #database #named
FOBr: A Version-Based Recovery Protocol For Replicated Databases (FCC, LIB, FGN, FDME), pp. 306–313.
PDPPDP-2005-PetitSP #comparison #hardware
A Comparison Study of the HLRC-DU Protocol versus a HLRC Hardware Assisted Protocol (SP, JS, AP), pp. 197–204.
WRLAWRLA-2004-CirsteaMR05 #java #programming #rule-based #verification
Rule-based Programming in Java For Protocol Verification (HC, PEM, AR), pp. 209–227.
WRLAWRLA-2004-MeseguerT05 #analysis #encryption #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-CortierW #automation #proving #security
Computationally Sound, Automated Proofs for Security Protocols (VC, BW), pp. 157–171.
ESOPESOP-2005-KremerR #analysis #π-calculus
Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
STOCSTOC-2005-KalaiLP #composition #concurrent
Concurrent general composition of secure protocols in the timing model (YTK, YL, MP), pp. 644–653.
STOCSTOC-2005-LepinksiMS
Collusion-free protocols (ML, SM, AS), pp. 543–552.
STOCSTOC-2005-PassR #encryption
New and improved constructions of non-malleable cryptographic protocols (RP, AR), pp. 533–542.
CADECADE-2005-Truderung
Regular Protocols and Attacks with Regular Knowledge (TT), pp. 377–391.
CAVCAV-2005-0002G #modelling #probability #verification
Improved Probabilistic Models for 802.11 Protocol Verification (AR, KG), pp. 239–252.
CAVCAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
ICLPICLP-2005-Chesani #formal method #interactive #verification
Formalization and Verification of Interaction Protocols (FC), pp. 437–438.
ICLPICLP-2005-CorinSE #analysis #constraints #security
PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
LICSLICS-2005-BlanchetAF #automation #security #verification
Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
ICTSSTestCom-2005-MillerCLH #network #nondeterminism #testing
Coping with Nondeterminism in Network Protocol Testing (REM, DC, DL, RH), pp. 129–145.
VMCAIVMCAI-2005-Goubault-LarrecqP #analysis #c #encryption
Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
WICSAWICSA-2004-MichielsDJV #architecture #self
The DiPS+ Software Architecture for Self-healing Protocol Stacks (SM, LD, WJ, PV), pp. 233–242.
ICALPICALP-2004-AbadiC #equation #security
Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
ICALPICALP-2004-AwerbuchS #distributed
Group Spreading: A Protocol for Provably Secure Distributed Name Service (BA, CS), pp. 183–195.
CSCWCSCW-2004-MorrisRSFV #coordination #multi #policy #social
Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
CSCWCSCW-2004-YangL #adaptation #collaboration #consistency
Separating data and control: support for adaptable consistency protocols in collaborative systems (YY, DL), pp. 11–20.
ICEISICEIS-v1-2004-Irun-BrizMB #database #distributed #lazy evaluation #replication
The Abortion Rate of Lazy Replication Protocols for Distributed Databases (LIB, FDME, JMBA), pp. 130–135.
ICEISICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #using
Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
SEKESEKE-2004-ChenS #interactive #specification #verification
Specification and Verification of Agent Interaction Protocols (BC, SS), pp. 300–305.
PEPMPEPM-2004-PopeeaC #correctness #proving #type system #verification
A type system for resource protocol verification and its correctness proof (CP, WNC), pp. 135–146.
FSEFSE-2004-WalkerV #declarative #implementation
Implementing protocols via declarative event patterns (RJW, KV), pp. 159–169.
ICSEICSE-2004-RyanW #evolution #using
Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
SACSAC-2004-Al-HoumailyC #commit #named
1-2PC: the one-two phase atomic commit protocol (YJAH, PKC), pp. 684–691.
SACSAC-2004-AlbertiDTGLM #interactive #specification #verification
Specification and verification of agent interaction protocols in a logic-based system (MA, DD, PT, MG, EL, PM), pp. 72–78.
SACSAC-2004-AwanY #commit #modelling #reliability #web
Analytical modelling of priority commit protocol for reliable Web applications (IA, MY), pp. 313–317.
SACSAC-2004-DiazCRP #automation #verification
Automatic verification of the TLS handshake protocol (GD, FC, VVR, FLP), pp. 789–794.
SACSAC-2004-FoulirasXTM #lightweight #multi #named #performance #video
LEMP: Lightweight Efficient Multicast Protocol for video on demand (PEF, SX, NT, AM), pp. 1226–1231.
SACSAC-2004-ParkerC #policy
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
SACSAC-2004-XueguangH #contract
Further extensions of FIPA Contract Net Protocol: threshold plus DoA (XC, HS), pp. 45–51.
DATEDATE-v1-2004-DSilvaRS #architecture #automaton #communication #framework #modelling #verification
Synchronous Protocol Automata: A Framework for Modelling and Verification of SoC Communication Architectures (VD, SR, AS), pp. 390–395.
DATEDATE-v2-2004-CasuM #implementation #latency
Issues in Implementing Latency Insensitive Protocols (MRC, LM), pp. 1390–1391.
DATEDATE-v2-2004-LaouamriA #network #testing #using
Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
HPDCHPDC-2004-WuC #evaluation
Evaluation of Rate-Based Transport Protocols for λ-Grids (X(W, AAC), pp. 87–96.
PDPPDP-2004-CalafateMM #flexibility #on-demand
A Flexible and Tunable Route Discovery Mechanism for On-Demand Protocols (CMTC, MPM, PM), pp. 408–415.
ESOPESOP-2004-BugliesiFM #analysis #authentication #composition
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
ESOPESOP-2004-Shmatikov #analysis #composition #decidability #encryption
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
FoSSaCSFoSSaCS-2004-BozgaEL #effectiveness #encryption #on the
On the Existence of an Effective and Complete Inference System for Cryptographic Protocols (LB, CE, YL), pp. 42–57.
FoSSaCSFoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #security
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
TACASTACAS-2004-BeauquierCP #automation #first-order #logic #parametricity #state machine #verification
Automatic Parametric Verification of a Root Contention Protocol Based on Abstract State Machines and First Order Timed Logic (DB, TC, EP), pp. 372–387.
TACASTACAS-2004-DelzannoG #automation #encryption #verification
Automatic Verification of Time Sensitive Cryptographic Protocols (GD, PG), pp. 342–356.
FATESFATES-2004-ArtsCS #development #erlang #fault tolerance
Semi-formal Development of a Fault-Tolerant Leader Election Protocol in Erlang (TA, KC, HS), pp. 140–154.
IJCARIJCAR-2004-SteelBM #induction
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
LICSLICS-2004-AbramskyC #category theory #quantum #semantics
A Categorical Semantics of Quantum Protocols (SA, BC), pp. 415–425.
ICTSSTestCom-2004-Schulz #consistency #testing
Derivation of Abstract Protocol Type Definitions for the Conformance Testing of Text-Based Protocols (SS), pp. 177–192.
VMCAIVMCAI-2004-Guttman #security #trust
Security, Protocols, and Trust (JDG), p. 1.
DocEngDocEng-2003-BrunDFLP #authoring #concurrent #documentation #semantics
Semantically-based text authoring and the concurrent documentation of experimental protocols (CB, MD, EF, SL, SP), pp. 193–202.
VLDBVLDB-2003-LuoNEW
Locking Protocols for Materialized Aggregate Join Views (GL, JFN, CJE, MW), pp. 596–607.
ITiCSEITiCSE-2003-Turau #hypermedia #named
HTTPExplorer: exploring the hypertext transfer protocol (VT), pp. 198–201.
CIAACIAA-2003-FuBS #specification #verification
Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services (XF, TB, JS), pp. 188–200.
FMFME-2003-ArmandoCG #analysis #graph #model checking #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-BoyerS #constraints #synthesis #verification
Synthesis and Verification of Constraints in the PGM Protocol (MB, MS), pp. 264–281.
FMFME-2003-Rusu #composition #verification
Compositional Verification of an ATM Protocol (VR), pp. 223–243.
RTARTA-2003-Comon-LundhC #decidability #encryption #first-order #logic
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols (HCL, VC), pp. 148–164.
RTARTA-2003-KapurNW #algorithm #composition
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
EDOCEDOC-2003-HansonM #contract
Conversation-oriented Protocols for Contract Negotiations (JEH, ZM), pp. 40–49.
ICEISICEIS-v2-2003-DoderoDA #collaboration #design #evaluation
Evaluation of an Agent-Mediated Collaborative Production Protocol in an Instructional Design Scenario (JMD, PD, IA), pp. 52–57.
ICEISICEIS-v2-2003-SmirnovPLC #constraints #contract
Constraint-Based Contract Net Protocol (AVS, MP, TL, NC), pp. 549–556.
ICEISICEIS-v4-2003-LingL #approach #composition #interactive #multi #petri net
Engineering Multiagent Systems Based on Interaction Protocols: A Compositional Petri Net Approach (SL, SWL), pp. 42–48.
PPDPPPDP-2003-Blanchet #approach #automation #encryption #logic programming #verification
Automatic verification of cryptographic protocols: a logic programming approach (BB), pp. 1–3.
SASSAS-2003-AbadiB #email #verification
Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
SACSAC-2003-Bella
Availability of Protocol Goals (GB), pp. 312–317.
SACSAC-2003-DattaS #energy #network
A Simple and Energy-Efficient Routing Protocol for Radio Networks (AD, SS), pp. 1014–1018.
SACSAC-2003-FrancescoP #authentication #mobile #reliability
Authenticity in a Reliable Protocol for Mobile Computing (NDF, MP), pp. 318–324.
SACSAC-2003-GuH #internet #ubiquitous #web
Extended Internet Caching Protocol: A Foundation for Building Ubiquitous Web Caching (WG, AH), pp. 901–907.
SACSAC-2003-PenaCA #approach #top-down
A Top Down Approach for MAS Protocol Descriptions (JP, RC, JLA), pp. 45–49.
SACSAC-2003-TariMM #web #web service #xml
An XML-based Conversational Protocol for Web Services (ZT, MM, MM), pp. 1179–1184.
SACSAC-2003-XiaH #configuration management #database #design #mobile
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration (YX, AH), pp. 550–556.
DATEDATE-2003-BertozziRBR #embedded #energy #optimisation #performance
Transport Protocol Optimization for Energy Efficient Wireless Embedded Systems (DB, AR, LB, SR), pp. 10706–10713.
DATEDATE-2003-LiliusTV #architecture #evaluation #performance
Fast Evaluation of Protocol Processor Architectures for IPv6 Routing (JL, DT, SV), pp. 20158–20163.
DATEDATE-2003-LykakisMVNPSKPR #performance
Efficient Field Processing Cores in an Innovative Protocol Processor System-on-Chip (GL, NM, KV, NAN, SP, GS, GEK, DNP, DIR), pp. 20014–20019.
DATEDATE-2003-RoychoudhuryMK #debugging #using
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
DATEDATE-2003-VanzagoBCL #configuration management #design #framework #platform
Design Space Exploration for a Wireless Protocol on a Reconfigurable Platform (LV, BB, JC, LL), pp. 10662–10667.
PDPPDP-2003-BaldoniM #scalability
k-Dependency Vectors: A Scalable Causality-Tracking Protocol (RB, GM), pp. 219–226.
PDPPDP-2003-CalafateM #development #interface #multi #platform #programming
A multi-platform programming interface for protocol development (CMTC, PM), pp. 243–249.
SOSPSOSP-2003-PatelWWLS #mobile #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
ESOPESOP-2003-GiambiagiD #implementation #on the #security
On the Secure Implementation of Security Protocols (PG, MD), pp. 144–158.
ESOPESOP-2003-GorrieriLM #analysis #encryption #realtime
A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
ESOPESOP-2003-Meadows #analysis #encryption #evolution #requirements #specification #what
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
FoSSaCSFoSSaCS-2003-BlanchetP #encryption #termination #verification
Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
FoSSaCSFoSSaCS-2003-FokkinkP #revisited #verification
Cones and Foci for Protocol Verification Revisited (WF, JP), pp. 267–281.
TACASTACAS-2003-BDSV #analysis #encryption #information management #representation
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
TACASTACAS-2003-BozgaLP #abstraction #verification
Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
TACASTACAS-2003-ChkliaevHV #verification
Verification and Improvement of the Sliding Window Protocol (DC, JH, EPdV), pp. 113–127.
TACASTACAS-2003-EmersonK #agile #model checking
Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols (EAE, VK), pp. 144–159.
TACASTACAS-2003-EsparzaM #multi
Simple Representative Instantiations for Multicast Protocols (JE, MM), pp. 128–143.
CAVCAV-2003-BozgaLP #automation #named #security #verification
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
LICSLICS-2003-ChevalierKRT
An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
LICSLICS-2003-EmersonK #model checking
Model Checking Guarded Protocols (EAE, VK), pp. 361–370.
ICSTSAT-2003-ArmandoC #analysis #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
ICTSSTestCom-2003-RanganathanDM #testing #using #xml
Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
ICTSSTestCom-2003-WuLY #modelling #testing #towards
Towards Modeling and Testing of IP Routing Protocols (JW, ZL, XY), pp. 49–62.
VMCAIVMCAI-2003-OgataF #verification
Formal Verification of the Horn-Preneel Micropayment Protocol (KO, KF), pp. 238–252.
WICSAWICSA-2002-ShiH #architecture #communication #modelling #using
Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
TPDLECDL-2002-SulemanF #component #design #library
Designing Protocols in Support of Digital Library Componentization (HS, EAF), pp. 568–582.
JCDLJCDL-2002-NelsonSW #metadata #overview
Advanced overview of version 2.0 of the open archives initiative protocol for metadata harvesting (MLN, HVdS, SW), p. 418.
JCDLJCDL-2002-PromH #using
Using the open archives initiative protocols with EAD (CJP, TGH), pp. 171–180.
JCDLJCDL-2002-Suleman #metadata
Introduction to the open archives initiative protocol for metadata harvesting (HS), p. 414.
VLDBVLDB-2002-BlottK #database #execution #in memory #transaction
An Almost-Serial Protocol for Transaction Execution in Main-Memory Database Systems (SB, HFK), pp. 706–717.
ICALPICALP-2002-KhannaNR #communication
Control Message Aggregation in Group Communication Protocols (SK, JN, DR), pp. 135–146.
RTARTA-2002-Mitchell #analysis #multi #security
Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
CAiSECAiSE-2002-BenerecettiPST #model checking #multi #verification
Verification of Payment Protocols via MultiAgent Model Checking (MB, MP, LS, ST), pp. 311–327.
CAiSECAiSE-2002-IvanDP #approach #complexity #design #middleware #using
Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
ICEISICEIS-2002-PantiSTV #automation #security #verification
Automatic Verification of Security in Payment Protocols for Electronic Commerce (MP, LS, ST, SV), pp. 968–974.
ICEISICEIS-2002-SadegSA #distributed #named #realtime #transaction
D-ANTICIP: A Protocol Suitable for Distributed Real-Time Transactions (BS, SSB, LA), pp. 171–178.
POPLPOPL-2002-AbadiB #logic programming #security #source code
Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
PPDPPPDP-2002-BozzanoD #automation #linear #logic #verification
Automated protocol verification in linear logic (MB, GD), pp. 38–49.
SASSAS-2002-Blanchet #authentication #security
From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
SASSAS-2002-CorinE #constraints #security #verification
An Improved Constraint-Based System for the Verification of Security Protocols (RC, SE), pp. 326–341.
SACSAC-2002-BorealeB #analysis #automation #security
Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
SACSAC-2002-BurnsideCMMDR #mobile #security
Proxy-based security protocols in networked mobile devices (MB, DEC, TM, AM, SD, RLR), pp. 265–272.
GPCEGPCE-2002-BarbeauB #development #generative #programming #stack #using
A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
DACDAC-2002-ChiasseriniNS #communication #energy
Energy-efficient communication protocols (CFC, PN, VS), pp. 824–829.
DACDAC-2002-SiegmundM #communication #declarative #hardware #novel #specification #synthesis
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications (RS, DM), pp. 602–607.
PDPPDP-2002-CanoM #clustering #energy #using
Reducing Energy Consumption in a Clustered MANET using the Intra Cluster Data-Dissemination Protocol (Icdp) (JCC, PM), pp. 411–418.
WRLAWRLA-2002-DenkerM #communication #modelling #multi #term rewriting #using
Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
WRLAWRLA-2002-OgataF #authentication #verification
Rewriting-Based Verification of Authentication Protocols (KO, KF), pp. 208–222.
WRLAWRLA-2002-Rodriguez #maude
A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
CAVCAV-2002-ArmandoBBCCMRTVV #analysis #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAVCAV-2002-BozzanoD #algorithm #verification
Algorithmic Verification of Invalidation-Based Protocols (MB, GD), pp. 295–308.
CAVCAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #refinement #verification
Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
CAVCAV-2002-ChevalierV #automation #bound #security #verification
Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
ICTSSTestCom-2002-Ahtiainen #formal method #mobile #testing
Applying Formal Method in Mobile Protocol Testing (AA), p. 187–?.
ICTSSTestCom-2002-Horvath #ad hoc #automation #generative #modelling #testing #validation
Ad-hoc Protocol Modelling, Validation and Automated Test Suite Generation (EH), p. 235–?.
ICTSSTestCom-2002-Kone
Compliance of Wireless Application Protocols (OK), pp. 129–138.
ICTSSTestCom-2002-SeolKC #communication #generative #multi #principle #testing
Interoperability Test Generation for Communication Protocols based on Multiple Stimuli Principle (SS, MK, STC), pp. 151–168.
VMCAIVMCAI-2002-BaukusLS #liveness #safety #verification
Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness (KB, YL, KS), pp. 317–330.
VMCAIVMCAI-2002-Shyamasundar #encryption #framework
Analyzing Cryptographic Protocols in a Reactive Framework (RKS), pp. 46–64.
WICSAWICSA-2001-GeppertR #design #internet
Collaboration-Based Design — Exemplified by the Internet Session Initiation Protocol (SIP) (BG, FR), p. 158–?.
JCDLJCDL-2001-GreenIG #tool support
SDLIP + STARTS = SDARTS a protocol and toolkit for metasearching (NG, PGI, LG), pp. 207–214.
JCDLJCDL-2001-Suleman01a #repository #using
Using the repository explorer to achieve OAI protocol compliance (HS), p. 459.
PODSPODS-2001-Schuldt #execution #order #process #transaction
Process Locking: A Protocol based on Ordered Shared Locks for the Execution of Transactional Processes (HS).
ICALPICALP-2001-Boreale #analysis #encryption
Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
ICALPICALP-2001-ComonCM #automaton #constraints #memory management #set
Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols (HC, VC, JM), pp. 682–693.
ICALPICALP-2001-MuschollP #communication #finite #sequence chart
From Finite State Communication Protocols to High-Level Message Sequence Charts (AM, DP), pp. 720–731.
FMFME-2001-IglesiasGCNF #case study #prototype #specification
From Complex Specifications to a Working Prototype. A Protocol Engineering Case Study (MJFI, FJGC, JMPC, MLN, ARF), pp. 436–448.
FMFME-2001-StoySA #correctness #proving
Proofs of Correctness of Cache-Coherence Protocols (JES, XS, A), pp. 43–71.
FLOPSFLOPS-2001-Delzanno #case study #debugging #prolog #security #specification
Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λ Prolog — A Case-study (GD), pp. 123–137.
CHICHI-2001-CardPWMRSB #analysis #behaviour #graph #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
VISSOFTSVIS-2001-CrescenziI #network #taxonomy #tool support #towards #visualisation
Towards a Taxonomy of Network Protocol Visualization Tools (PC, GI), pp. 241–255.
LOPSTRLOPSTR-2001-DelzannoE #debugging #logic programming #proving #security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols (GD, SE), pp. 76–90.
PADLPADL-2001-BellaB #analysis #constraints #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
PADLPADL-2001-Cirstea #authentication #specification #using
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
PLDIPLDI-2001-DeLineF #bytecode #low level
Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
SASSAS-2001-Blanchet #encryption #prolog
Abstracting Cryptographic Protocols by Prolog Rules (BB), pp. 433–436.
SASSAS-2001-GordonJ #analysis #security
A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
ASEASE-2001-ChevalierV #lazy evaluation #security #verification
A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
ASEASE-2001-JurjensW #testing
Formally Testing Fail-Safety of Electronic Purse Protocols (JJ, GW), pp. 408–411.
SACSAC-2001-NakanoHSN #effectiveness #hypermedia #streaming #web
Extending hypertext streaming protocol to realize effective web page transmission via a chaching proxy (TN, KH, SS, SN), pp. 440–445.
DACDAC-2001-ChelceaN #interface #robust
Robust Interfaces for Mixed-Timing Systems with Application to Latency-Insensitive Protocols (TC, SMN), pp. 21–26.
PDPPDP-2001-BertozziPR #communication #design
Design of a VIA Based Communication Protocol for LAM/MPI Suite (MB, MP, MR), pp. 27–33.
ESOPESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
FASEFASE-2001-OlveczkyKMTZ #analysis #maude #network #realtime #specification
Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
STOCSTOC-2001-Ambainis #bound #quantum
A new protocol and lower bounds for quantum coin flipping (AA), pp. 134–142.
STOCSTOC-2001-KempeKD
Spatial gossip and resource location protocols (DK, JMK, AJD), pp. 163–172.
STOCSTOC-2001-NaorN #communication #evaluation
Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
CAVCAV-2001-AlurW #implementation #network #refinement #verification
Verifying Network Protocol Implementations by Symbolic Refinement Checking (RA, BYW), pp. 169–181.
CAVCAV-2001-KwiatkowskaNS #automation #distributed #random #using #verification
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
CAVCAV-2001-RoychoudhuryR #automation #induction #verification
Automated Inductive Verification of Parameterized Protocols (AR, IVR), pp. 25–37.
CAVCAV-2001-SongPP #automation #generative #implementation #named #security #verification
AGVI — Automatic Generation, Verification, and Implementation of Security Protocols (DXS, AP, DP), pp. 241–245.
LICSLICS-2001-MitchellRST #analysis #calculus #probability #process #security
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
LICSLICS-2001-Stoller #bound
A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
ICALPICALP-2000-FocardiGM #analysis #encryption
Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
ICALPICALP-2000-GoldbergJKP #bound #capacity
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols (LAG, MJ, SK, MP), pp. 705–716.
WLCWLC-2000-YamamuraK
Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
EDOCEDOC-2000-QuEM #framework #implementation #platform
Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol (CQ, TE, CM), pp. 160–169.
ICEISICEIS-2000-HeL #towards
Towards a Secure and Complete Protocol for Electronic Commerce (RH, KL), pp. 435–441.
TOOLSTOOLS-ASIA-2000-MingliangYBL #distributed #multi
Protocol Mapping Model for Distributed Multimedia Systems (WM, QY, MB, XL), pp. 114–121.
TOOLSTOOLS-EUROPE-2000-CanalFTV #calculus #corba #interface
Extending CORBA Interfaces with p-Calculus for Protocol Compatibility (CC, LF, JMT, AV), pp. 208–225.
TOOLSTOOLS-EUROPE-2000-ParssinenKHOT #case study #experience #uml
UML for Protocol Engineering — Extensions and Experiences (JP, NvK, JH, TO, MT), pp. 82–93.
TOOLSTOOLS-USA-2000-SinghW #composition #design #distributed #object-oriented
Modular Object-Oriented Design of Distributed Protocols (GS, JW), pp. 329–338.
LOPSTRLOPSTR-2000-PoernomoC #proving #source code
Protocols between programs and proofs (IP, JNC).
LOPSTRLOPSTR-J-2000-PoernomoC #proving #source code
Protocols between Programs and Proofs (IP, JNC), pp. 18–37.
FSEFSE-2000-ButkevichRBY #compilation #debugging #tool support
Compiler and tool support for debugging object protocols (SB, MR, GB, MY), pp. 50–59.
SACSAC-2000-Lyon #assurance #web
Assurance Protocols and Small Web Retailers (GEL), pp. 904–908.
SACSAC-2000-YeoYP #consistency #distributed #memory management
An Asynchronous Protocol for Release Consistent Distributed Shared Memory Systems (JHY, HYY, TP), pp. 716–721.
ASPLOSASPLOS-2000-ChouCEH #compilation #using
Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
DACDAC-2000-EisnerSHNNV #design #hardware
A methodology for formal design of hardware control with application to cache coherence protocols (CE, IS, RH, WGN, KLN, KV), pp. 724–729.
DACDAC-2000-KatagiriYKHT #communication #concurrent #hardware #implementation #multi
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization (HK, KY, AK, TH, KT), pp. 762–767.
DATEDATE-2000-MurookaM
Protocol Stack-Based Telecom-Emulator (TM, TM), pp. 186–191.
PDPPDP-2000-LefevreR #clustering #communication #multi #performance #thread
Combining low-latency communication protocols with multithreading for high performance DSM systems on clusters (LL, OR), pp. 333–340.
STOCSTOC-2000-Klauck #communication #on the #probability #quantum
On quantum and probabilistic communication: Las Vegas and one-way protocols (HK), pp. 644–651.
TACASTACAS-2000-BenerecettiG #logic #model checking #security #using
Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
TACASTACAS-2000-ClarkeJM #partial order #reduction #security #verification
Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
WRLAWRLA-2000-BasinD #analysis #comparison #haskell #maude #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
WRLAWRLA-2000-MasonT #maude #network #simulation
Simple Network Protocol Simulation within Maude (IAM, CLT), pp. 274–291.
WRLAWRLA-2000-Millen #analysis #encryption #overview #term rewriting
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
WRLAWRLA-2000-Rodriguez #analysis #case study #maude #specification
Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
WRLAWRLA-2000-VerdejoPM #maude
The Leader Election Protocol of IEEE 1394 in Maude (AV, IP, NMO), pp. 383–404.
CADECADE-2000-GenetK #encryption #verification
Rewriting for Cryptographic Protocol Verification (TG, FK), pp. 271–290.
CAVCAV-2000-Cohen #encryption #first-order #named #verification
TAPS: A First-Order Verifier for Cryptographic Protocols (EC), pp. 568–571.
CAVCAV-2000-Delzanno #automation #verification
Automatic Verification of Parameterized Cache Coherence Protocols (GD), pp. 53–68.
CAVCAV-2000-Meadows #analysis #encryption #formal method
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
ICLPCL-2000-DutraCB #logic programming #parallel
The Impact of Cache Coherence Protocols on Parallel Logic Programming Systems (IdCD, VSC, RB), pp. 1285–1299.
ICTSSTestCom-2000-BousquetRSVBV #automation #testing
Formal Test Automation: The Conference Protocol with TGV/TORX (LdB, SR, SS, CV, AB, RGdV), pp. 221–228.
ICTSSTestCom-2000-HeerinkFT #automation #testing
Formal Test Automation: The Conference Protocol with PHACT (LH, JF, JT), pp. 211–220.
ICTSSTestCom-2000-KhoumsiADEG #approach #realtime #testing
An Approach for Testing Real Time Protocol Entities (AK, MA, RD, AEN, LG), pp. 281–300.
SIGMODSIGMOD-1999-BreitbartKRSS #database
Update Propagation Protocols For Replicated Databases (YB, RK, RR, SS, AS), pp. 97–108.
ICALPICALP-1999-ComptonD #encryption #proving
Proof Techniques for Cryptographic Protocols (KJC, SD), pp. 25–39.
FMFM-v1-1999-TabourierCI #empirical #testing #using
A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
FMFM-v1-1999-ZhouC #analysis #communication #formal method
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
FMFM-v2-1999-CimattiPSTV #communication #specification #validation
Formal Specification and Validation of a Vital Communication Protocol (AC, PLP, RS, PT, AV), pp. 1584–1604.
IFMIFM-1999-Grosse-Rhode #algebra #comparison #composition #specification
A Compositional Comparison of Specifications of the Alternating Bit Protocol in CCS and UNITY Based on Algebra Transformation Systems (MGR), pp. 253–272.
HCIHCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #using
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
CAiSECAiSE-1999-MelloulBSW #composition
CPAM, A Protocol for Software Composition (LM, DB, NS, GW), pp. 11–25.
EDOCEDOC-1999-OrvalhoFB #corba #multi #reliability
Evaluating light-weight reliable multicast protocol extensions to the CORBA event service (JO, LF, FB), pp. 255–261.
ICEISICEIS-1999-JungBP #agile #framework #implementation #network #prototype
Implementing Network Protocols in Java-A Framework for Rapid Prototyping (MJ, EB, AP), pp. 649–656.
ICEISICEIS-1999-JunHSKP #network #performance
An Efficient Protocol for Radio Packet Networks (ARJ, SJH, HSS, GHK, MSP), pp. 642–648.
TOOLSTOOLS-USA-1999-PlasilBV #behaviour #bound #component
Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
AdaEuropeAdaEurope-1999-RealW #multi #realtime
The Ceiling Protocol in Multi-moded Real-Time Systems (JR, AJW), pp. 275–286.
SASSAS-1999-Monniaux #automaton #encryption
Abstracting Cryptographic Protocols with Tree Automata (DM), pp. 149–163.
ASEASE-1999-BesseCL #automation #generative #testing
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol (CB, ARC, DL), pp. 73–80.
ASEASE-1999-Brackin #analysis #automation #effectiveness #encryption #implementation
Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
SACSAC-1999-BakC #random
Randomized Distance-Vector Routing Protocol (SB, JAC), pp. 78–84.
DATEDATE-1999-ONilsJ #implementation #independence #operating system #specification #synthesis
Operating System Sensitive Device Driver Synthesis from Implementation Independent Protocol Specification (MO, AJ), pp. 562–567.
HPCAHPCA-1999-CoxLHZ #comparison #consistency #lazy evaluation #memory management #performance
A Performance Comparison of Homeless and Home-Based Lazy Release Consistency Protocols in Software Shared Memory (ALC, EdL, YCH, WZ), pp. 279–283.
HPCAHPCA-1999-FalsafiW #abstraction #communication #parallel #programming #queue
Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols (BF, DAW), pp. 182–192.
LCTESLCTES-1999-LeeJS #database #realtime
A Secure Dynamic Copy Protocol in Real-Time Secure Database Systems (SL, BSJ, HS), pp. 73–79.
FoSSaCSFoSSaCS-1999-Abadi #security #specification
Security Protocols and Specifications (MA), pp. 1–13.
STOCSTOC-1999-ScheidelerV #performance
From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols (CS, BV), pp. 215–224.
TACASTACAS-1999-AbdullaAB #bound #verification
Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol (PAA, AA, AB), pp. 208–222.
TACASTACAS-1999-KahloucheVZ #communication #consistency #hardware #testing #using
Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
TACASTACAS-1999-MarchignoliM #analysis #automation #composition #encryption #verification
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
CADECADE-1999-Weidenbach #analysis #automation #first-order #logic #security #towards
Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
CAVCAV-1999-BerardF #automation #consistency #parametricity #realtime #verification
Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol (BB, LF), pp. 96–107.
CAVCAV-1999-CarloniMS #latency
Latency Insensitive Protocols (LPC, KLM, ALSV), pp. 123–133.
CAVCAV-1999-Schumann #analysis #authentication #automation #named
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
CSLCSL-1999-DelzannoEP #analysis #constraints
Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
ICTSSIWTCS-1999-Cavalli #testing
Different Approaches to Protocol and Service Testing (ARC), pp. 3–18.
ICTSSIWTCS-1999-KangSKHYKSYK #consistency #development
Development and Application of ATM Protocol Conformance Test System (SK, YS, DK, MH, JY, IK, JS, SY, MK), pp. 331–346.
ICTSSIWTCS-1999-LatvakoskiH #communication #embedded #simulation #testing
Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems (JL, HH), pp. 379–394.
LICSLICS-1999-EsparzaFM #on the #verification
On the Verification of Broadcast Protocols (JE, AF, RM), pp. 352–359.
LICSLICS-1999-Paulson #proving #security
Proving Security Protocols Correct (LCP), pp. 370–381.
ADLADL-1998-NelsonMSZ #clustering #multi #using
NCSTRL+: Adding Multi-Discipline and Multi-Genre Support to the Dienst Protocol Using Clusters and Buckets (MLN, KM, SNTS, MZ), pp. 128–136.
ICALPICALP-1998-MukundKRS #finite #robust
Robust Asynchronous Protocols Are Finite-State (MM, KNK, JR, MAS), pp. 188–199.
FMFM-1998-FujitaRH #case study #experience #parallel #verification
Two Real Formal Verification Experiences: ATM Switch Chip and Parallel Cache Protocol (MF, SPR, AJH), pp. 281–295.
TOOLSTOOLS-USA-1998-ChoMK #approach #specification
A Protocol Based Approach to Specifying Interoperability between Objects (IHC, JDM, LK), pp. 84–96.
DACDAC-1998-HoltmannB #compilation #design #using
Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
DACDAC-1998-PasseroneRS #automation #interface #synthesis
Automatic Synthesis of Interfaces Between Incompatible Protocols (RP, JAR, ALSV), pp. 8–13.
DATEDATE-1998-ObergHK #communication #grammarware #hardware #scheduling #synthesis
Scheduling of Outputs in Grammar-based Hardware Synthesis of Data Communication Protocols (, AH, AK), pp. 596–603.
HPCAHPCA-1998-SamantaBIS #clustering #design #performance
Home-Based SVM Protocols for SMP Clusters: Design and Performance (RS, AB, LI, JPS), pp. 113–124.
HPDCHPDC-1998-CzechHG #composition #flexibility #kernel
Flexible Protocol Stacks by In-Kernel Composition (CBC, BH, MG), pp. 344–345.
HPDCHPDC-1998-OguchiSTK #clustering #data mining #effectiveness #evaluation #mining #optimisation #parallel #parametricity #scalability
Optimizing Protocol Parameters to Large Scale PC Cluster and Evaluation of its Effectiveness with Parallel Data Mining (MO, TS, TT, MK), pp. 34–41.
HPDCHPDC-1998-PagniaT #replication
Improving Replication Protocols through Priorities (HP, OET), pp. 342–343.
LCTESLCTES-1998-GeorgeM #multi #reliability
A Uniform Reliable Multicast Protocol with Guaranteed Response Times (LG, PM), pp. 65–82.
ESOPESOP-1998-AbadiG #bisimulation #encryption
A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
STOCSTOC-1998-BellareCK #analysis #approach #authentication #composition #design
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (MB, RC, HK), pp. 419–428.
STOCSTOC-1998-ColeMHMRSSV #multi #network #random
Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks (RC, BMM, FMadH, MM, AWR, KS, RKS, BV), pp. 378–388.
WRLAWRLA-1998-StegglesK #case study #logic #semantics
A timed rewriting logic semantics for SDL: A case study of alternating bit protocol (LJS, PK), pp. 83–104.
CAVCAV-1998-Bolignano #encryption #model checking #verification
Integrating Proof-Based and Model-Checking Techniques for the Formal Verification of Cryptographic Protocols (DB), pp. 77–87.
CAVCAV-1998-EmersonN #verification
Verification of Parameterized Bus Arbitration Protocol (EAE, KSN), pp. 452–463.
CAVCAV-1998-FeltyHS #verification
Protocol Verification in Nuprl (APF, DJH, FAS), pp. 428–439.
CAVCAV-1998-Mitchell #analysis #finite #security
Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
ICTSSIWTCS-1998-BourhfirDAR #consistency #generative #incremental #testing
A Guided Incremental Test Case Generation Procedure for Conformance Testing for CEFSM Specified Protocols (CB, RD, EMA, NR), pp. 275–290.
ICTSSIWTCS-1998-Gecse #consistency #hypermedia #internet #testing
Conformance Testing Methodology of Internet Protocols Internet Application-Layer Protocol Testing — the Hypertext Transfer Protocol (RG), pp. 35–48.
ICTSSIWTCS-1998-KahloucheVZ #automation #empirical #execution #generative #industrial #testing
An Industrial Experiment in Automatic Generation of Executable Test Suites for a Cache Coherency Protocol (HK, CV, MZ), pp. 211–226.
ICTSSIWTCS-1998-OgishiIKS #exception
Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
ICTSSIWTCS-1998-ShinK #testing
Interoperability Test Suite Derivation for the ATM/B-ISDN Signaling Protocol (JS, SK), pp. 307–326.
FMFME-1997-AyadiB #empirical #encryption #verification
Verification of Cryptographic Protocols: An Experiment (MMA, DB), pp. 358–377.
FMFME-1997-Gregoire #proving #using
TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
FMFME-1997-MokkedemFJ #specification #verification
A TLA Solution to the Specification and Verification of the RLP1 Retransmission Protocol (AM, MJF, RdBJ), pp. 398–417.
TOOLSTOOLS-ASIA-1997-YanW #design #object-oriented
An Object-Oriented Model for Protocol Design (SBY, FJW), pp. 12–21.
TOOLSTOOLS-USA-1997-SeinturierDF #distributed #object-oriented
A Meta-Object Protocol for Distributed OO Applications (LS, LD, GF), pp. 306–317.
PEPMPEPM-1997-MullerVM #optimisation #partial evaluation #scalability
Scaling up Partial Evaluation for Optimizing the Sun Commercial RPC Protocol (GM, ENV, RM), pp. 116–126.
SACSAC-1997-Al-HoumailyCL #commit #performance
Enhancing the performance of presumed commit protocol (YJAH, PKC, SPL), pp. 131–133.
SACSAC-1997-GhoshGP #network
Fault-containing network protocols (SG, AG, SVP), pp. 431–437.
SACSAC-1997-KhasawnehO #evaluation #network
An evaluation study of protocols used in cable TV networks (RMK, MSO), pp. 52–57.
SACSAC-1997-LuL
A negotiation protocol for batch task assignments in dynamic load distribution (CL, SML), pp. 447–453.
SACSAC-1997-MostafaS #collaboration #multi #reliability
A reliable multicast session protocol for collaborative continuous-feed applications (WM, MS), pp. 35–39.
HPCAHPCA-1997-AmzaCDZ #adaptation #multi
Software DSM Protocols that Adapt between Single Writer and Multiple Writer (CA, ALC, SD, WZ), pp. 261–271.
HPDCHPDC-1997-FriedmanR #performance
Packing Messages as a Tool for Boosting the Performance of Total Ordering Protocols (RF, RvR), pp. 233–242.
HPDCHPDC-1997-HaydenR #communication #optimisation
Optimizing Layered Communication Protocols (MH, RvR), pp. 169–177.
PDPPDP-1997-CostaBD #logic programming #parallel
Evaluating the impact of coherence protocols on parallel logic programming systems (VSC, RB, IdCD), pp. 376–381.
PPoPPPPoPP-1997-BianchiniCK #interactive #parallel #programming
The Interaction of Parallel Programming Constructs and Coherence Protocols (RB, EVC, LIK), pp. 69–79.
PPoPPPPoPP-1997-RaghavachariR #named
Ace: Linguistic Mechanisms for Customizable Protocols (MR, AR), pp. 80–89.
STOCSTOC-1997-KargerLLPLL #consistency #distributed #random #web
Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web (DRK, EL, FTL, RP, MSL, DL), pp. 654–663.
TACASTACAS-1997-DArgenioKRT #bound #exclamation
The Bounded Retransmission Protocol Must Be on Time! (PRD, JPK, TCR, JT), pp. 416–431.
TAPSOFTTAPSOFT-1997-KristoffersenLLPY #composition #proving #realtime
A Compositional Proof of a Real-Time Mutual Exclusion Protocol (KJK, FL, KGL, PP, WY0), pp. 565–579.
CADECADE-1997-Schumann #automation #encryption #verification
Automatic Verification of Cryptographic Protocols with SETHEO (JS), pp. 87–100.
ITiCSEITiCSE-1996-GrundkeZ #visualisation
Simulator for visualizing data link layer protocols (EWG, ZZ), p. 235.
FMFME-1996-BoigelotG #analysis #model checking #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
FMFME-1996-HavelundS #model checking #proving #theorem proving #verification
Experiments in Theorem Proving and Model Checking for Protocol Verification (KH, NS), pp. 662–681.
CSCWCSCW-1996-KatzenbergPM #evolution
Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care (BK, FP, JPM), pp. 364–369.
CSCWCSCW-1996-PalfreymanR #web
A Protocol for User Awareness on the World Wide Web (KP, TR), pp. 130–139.
SEKESEKE-1996-SlivaMS #communication
A Method for Applying G-Nets To Communication Protocols (VPS, TM, SMS), pp. 145–152.
ECOOPECOOP-1996-GarbinatoFG #design #distributed #reliability
Protocol Classes for Designing Reliable Distributed Environments (BG, PF, RG), pp. 316–343.
PLDIPLDI-1996-ChandraRL #memory management #named
Teapot: Language Support for Writing Memory Coherence Protocols (SC, BR, JRL), pp. 237–248.
AdaTRI-Ada-1996-YueDL #ada
Priority Ceiling Protocol in Ada (KbY, SD, TL), pp. 3–9.
FSEFSE-1996-NaumovichCO #analysis #communication #data flow #using #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
SACSAC-1996-Al-HoumailyC #commit #multi
Dealing with incompatible presumptions of commit protocols in multidatabase systems (YJAH, PKC), pp. 186–195.
SACSAC-1996-KhalilSO #network #simulation
A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks (KMK, YSS, MSO), pp. 77–81.
SACSAC-1996-MengelA #network #tutorial
A network protocol analyzer with tutorial (SM, SA), pp. 115–119.
SACSAC-1996-Nanavati #self
A simple self-stabilizing reset protocol (AAN), pp. 93–97.
HPCAHPCA-1996-AndersonK #adaptation #hybrid
Two Adaptive Hybrid Cache Coherency Protocols (CA, ARK), pp. 303–313.
HPCAHPCA-1996-RaynaudZT #adaptation #multi #scalability
Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors (AR, ZZ, JT), pp. 323–334.
HPCAHPCA-1996-ReisnerW #parallel
A Cache Coherency Protocol for Optically Connected Parallel Computer Systems (JAR, TSW), pp. 222–231.
HPCAHPCA-1996-TakahashiTKS #multi
A Shared-Bus Control Mechanism and a Cache Coherence Protocol for a High-Performance On-Chip Multiprocessor (MT, HT, EK, SS), pp. 314–322.
HPDCHPDC-1996-BraunCDGG #automation #compilation #distributed #implementation
ALFred, a Protocol Compiler for the Automated Implementation of Distributed Applications (TB, IC, CD, FG, LG), pp. 450–459.
TACASTACAS-1996-Lowe #using
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
CAVCAV-1996-BengtssonGKLLPY #using #verification
Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
CAVCAV-1996-BoigelotG #communication #infinity #using #verification
Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (BB, PG), pp. 1–12.
CAVCAV-1996-FernandezGKMMS #named #validation #verification
CADP — A Protocol Validation and Verification Toolbox (JCF, HG, AK, LM, RM, MS), pp. 437–440.
CAVCAV-1996-MerinoT #analysis #communication #integration #named #verification
EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
CAVCAV-1996-ParkD #distributed #transaction #verification
Protocol Verification by Aggregation of Distributed Transactions (SP, DLD), pp. 300–310.
ISSTAISSTA-1996-BarjaktarovicCJ #functional #kernel #specification #using #verification
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
ISSTAISSTA-1996-CallahanM #approach #multi #reliability #validation #verification
An Approach to Verification and Validation of a Reliable Multicasting Protocol (JRC, TLM), pp. 187–194.
ICLPJICSLP-1996-DeneckerBDPS #calculus #empirical #information management #representation #specification
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification (MD, KVB, GD, FP, DDS), pp. 170–184.
LICSLICS-1996-GodefroidL #queue #verification
Symbolic Protocol Verification With Queue BDDs (PG, DEL), pp. 198–206.
SIGMODSIGMOD-1995-MoleskyR #database #memory management
Recovery Protocols for Shared Memory Database Systems (LDM, KR), pp. 11–22.
SEKESEKE-1995-Lin #verification
Formal Verification of the File Transfer Protocol (FL), pp. 117–122.
SEKESEKE-1995-LinL #message passing #model checking #verification
Formal Verification of a Message-Passing Protocol with Model Checking (AL, FL), pp. 296–302.
ECOOPECOOP-1995-Florijn #functional #parsing
Object Protocols as Functional Parsers (GF), pp. 351–373.
ECOOPECOOP-1995-LeaM #interface #specification #using
Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
ECOOPECOOP-1995-StroudW #data type #using
Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
OOPSLAOOPSLA-1995-Chiba #c++
A Metaobject Protocol for C++ (SC), pp. 285–299.
OOPSLAOOPSLA-1995-HuniJE #framework #network
A Framework for Network Protocol Software (HH, REJ, RE), pp. 358–369.
DACDAC-1995-NarayanG #generative #interface #process #using
Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
HPDCHPDC-1995-Sivalingam #hybrid #network
Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks (KMS), pp. 40–47.
HPDCHPDC-1995-TachikawaT #communication #multi
Multimedia Intra-Group Communication Protocol (TT, MT), pp. 180–187.
SOSPSOSP-1995-GopalakrishnanP #realtime
A Real-time Upcall Facility for Protocol Processing with QoS Guarantees (RG, GMP), p. 231.
STOCSTOC-1995-Yao #metric #quantum #security
Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
CAVCAV-1995-HoW #analysis #automation
Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
PODSPODS-1994-AlonsoAA #constraints
Reducing Recovery Constraints on Locking based Protocols (GA, DA, AEA), pp. 129–138.
ICALPICALP-1994-BlundoSV #distributed
Randomness in Distributed Protocols (CB, ADS, UV), pp. 568–579.
LISPLFP-1994-BiagioniHLM #ml #network #stack #standard
Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
CSCWCSCW-1994-FurutaS #collaboration #prototype
Interpreted Collaboration Protocols and Their Use in Groupware Prototyping (RF, PDS), pp. 121–131.
SEKESEKE-1994-DuranteSV #specification
A LOTOS specification of the SERCOS field-bus protocol (LD, RS, AV), pp. 139–147.
OOPSLAOOPSLA-1994-YellinS #adaptation #automation #interface
Interfaces, Protocols, and the Semi-Automatic Construction of Software Adaptors (DMY, RES), pp. 176–190.
ASPLOSASPLOS-1994-SkeppstedtS #algorithm #compilation
Simple Compiler Algorithms to Reduce Ownership Operhead in Cache Coherence Protocols (JS, PS), pp. 286–296.
DACDAC-1994-NarayanG #communication #generative
Protocol Generation for Communication Channels (SN, DG), pp. 547–551.
HPDCHPDC-1994-BurrellMP #analysis #capacity #implementation #multi #network #performance
Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
HPDCHPDC-1994-MoralesA #design #implementation #logic
Design of a Header Processor for the PSi Implementation of the Logical Link Control Protocol in LANs (FAM, HAA), pp. 270–277.
HPDCHPDC-1994-TakamuraT #communication #performance #scalability
Large-Scale Group Communication Protocol on High-Speed Channel (MT, MT), pp. 254–261.
PDPPDP-1994-Beus-DukicG #evaluation #performance
Performance Evaluation Of Time-critical Protocols (LBD, CG), pp. 400–405.
PDPPDP-1994-CremonesiSS #image #parallel
Image Processing on Parallel Machines: A Protocol For Managing Global Objects (PC, NS, DGS), pp. 14–21.
STOCSTOC-1994-FeigeK #fault #proving
Two prover protocols: low error at affordable rates (UF, JK), pp. 172–183.
STOCSTOC-1994-MacKenziePR #on the #probability
On contention resolution protocols and associated probabilistic phenomena (PDM, CGP, RR), pp. 153–162.
CAVCAV-1994-MihailP #on the #random #testing
On the Random Walk Method for Protocol Testing (MM, CHP), pp. 132–141.
CAVCAV-1994-NaikS #model checking #modelling #using #verification
Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
ISSTAISSTA-1994-BochmannP #overview #testing
Protocol Testing: Review of Methods and Relevance for Software Testing (GvB, AP), pp. 109–124.
FMFME-1993-WidyaH #specification #towards
Towards an Implementation-oriented Specification of TP Protocol in LOTOS (IW, GJvdH), pp. 93–109.
HCIHCI-ACS-1993-Vanderheiden #generative #information management #interface #using
Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
TOOLSTOOLS-EUROPE-1993-LakosK #modelling
Modeling a Door Controller Protocol in LOOPN (CAL, CK), pp. 31–43.
AdaEuropeAdaEurope-1993-BjornfotALW #ada #distributed #runtime
Distributed Run-Time Systems, a Protocol for Ada (LB, LA, KL, GW), pp. 249–263.
HPDCHPDC-1993-DobosiewiczG #named #network
DSMA: A Fair Capacity-1 Protocol for Gigabit Ring Networks (WD, PG), pp. 92–100.
HPDCHPDC-1993-MullinTDS #communication #formal method #scheduling
Formal Method for Scheduling, Routing and Communication Protocol (LMRM, ST, DRD, EAS), pp. 234–242.
HPDCHPDC-1993-NakamuraT #network #performance
Starvation-Prevented Priority-Based Total Ordering Broadcast Protocol on High-Speed Single Channel Network (AN, MT), pp. 281–288.
SOSPSOSP-1993-MaedaB #composition #network
Protocol Service Decomposition for High-Performance Networking (CM, BNB), pp. 244–255.
STOCSTOC-1993-CooperL #linear #performance
Fast perfection-information leader-election protocol with linear immunity (JC, NL), pp. 662–671.
CAVCAV-1993-Varaiya #automation #design
Protocol Design for an Automated Highway System (PV), p. 180.
ICLPICLP-1993-LadretR #logic programming #testing
Contribution of Logic Programming to Support Telecommunications Protocol Tests (DL, MR), pp. 845–846.
ICTSSIWPTS-1993-ChansonDKLLVZZZ #testing
The UBC Protocol Testing Environment (STC, HD, MK, QL, YL, STV, SZ, LZ, JZ), pp. 215–230.
ICTSSIWPTS-1993-GhrigaF #adaptation #communication #nondeterminism #testing
Adaptive Testing of Non-Deterministic Communication Protocols (MG, PGF), pp. 347–362.
ICTSSIWPTS-1993-HennigerSB #generative #specification #testing
Test Suite Generation for Application Layer Protocols from Formal Specifications in Estelle (OH, BS, SB), pp. 67–85.
ICTSSIWPTS-1993-KalyanasundaramA #testing #visualisation
Protocol Test Case Visualization (PK, PDA), pp. 197–214.
ICTSSIWPTS-1993-MottelerCS #fault #testing
Fault Coverage of UIO-based Methods for Protocol Testing (HEM, AC, DPS), pp. 21–34.
ICTSSIWPTS-1993-PetrenkoDK #evaluation #on the #testing
On Evaluation of Testability of Protocol Structures (AP, RD, HK), pp. 111–124.
ICTSSIWPTS-1993-PetrenkoYLD #consistency #nondeterminism #state machine #testing
Nondeterministic State Machines in Protocol Conformance Testing (AP, NY, AL, AD), pp. 363–378.
ICTSSIWPTS-1993-VuongLC #communication #design #framework #testing
A Framework for the Design for Testability of Communication Protocols (STV, AAFL, STC), pp. 89–108.
PODSPODS-1992-AgrawalAJ #approach #transaction
An Approach to Eliminate Transaction Blocking in Locking Protocols (DA, AEA, RJ), pp. 223–235.
PODSPODS-1992-RabinovichL #commit #database #fault tolerance
A Fault-Tolerant Commit Protocol for Replicated Databases (MR, EDL), pp. 139–148.
SIGMODSIGMOD-1992-AgrawalAJ #database #realtime #using
Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
SIGMODSIGMOD-1992-HarrisRW #concurrent #database #multi #performance
A High Performance Multiversion Concurrency Control Protocol of Object Databases (CH, MR, CW), p. 320.
SIGMODSIGMOD-1992-JhingranK #analysis #database #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMODSIGMOD-1992-RabinovichL #fault tolerance
Improving Fault Tolerance and Supporting Partial Writes in Structured Coterie Protocols for Replicated Objects (MR, EDL), pp. 226–235.
CSEETSEI-1992-Lai #education
Teaching Protocol Engineering in Honours Year (RL), pp. 143–156.
SEKESEKE-1992-ZhangWG #programming
An Open System Protocol for Agent-Oriented Programming (WRZ, WW, AG), pp. 616–623.
ECOOPECOOP-1992-GuerraouiCLR #message passing
Nesting Actions through Asynchronous Message Passing: the ACS Protocol (RG, RC, AL, PR), pp. 170–184.
SOSPSOSP-WIP-1991-KasshoekRST92 #distributed
FLIP; an Internetwork Protocol for Supporting Distributed Systems (MFK, RvR, HvS, AST), p. 29.
ASPLOSASPLOS-1992-VeenstraF #evaluation #hybrid #performance
A Performance Evaluation of Optimal Hybrid Cache Coherency Protocols (JEV, RJF), pp. 149–160.
HPDCHPDC-1992-BogineniD #comparison #network #performance
Performance Comparison of Reservation and Preallocation Protocols for Star-Coupled WDM Photonic Networks (KB, PWD), pp. 94–103.
HPDCHPDC-1992-SchmidtBS #adaptation #architecture #flexibility #lightweight #multi #named #network #performance
ADAPTIVE: A Flexible and Adaptive Transport System Architecture to Support Lightweight Protocols for Multimedia Applications on High-Speed Networks (DCS, DFB, TS), pp. 174–186.
ICTSSIWPTS-1992-CavalliMK #automation #consistency #formal method #generative #specification #testing
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications (ARC, PM, SUK), pp. 237–248.
ICTSSIWPTS-1992-ChungS #generative #performance #testing
Applications of Sufficient Conditions for Efficient Protocol Test Generation (AC, DPS), pp. 219–228.
ICTSSIWPTS-1992-Koster #consistency #problem #testing
Problems and Difficulties with GSM Protocol Conformance Testing (RK), p. 291.
ICTSSIWPTS-1992-Witteman #consistency #experience
Promoting the Local Test Method, GSM Protocol Conformance Test Experience (MFW), pp. 292–294.
PODSPODS-1991-JohnsonR #bound #consistency #replication
A Tight Upper Bound on the Benefits of Replication and Consistency Control Protocols (DBJ, LR), pp. 75–81.
SIGMODSIGMOD-1991-LevyKS #commit #distributed #transaction
An Optimistic Commit Protocol for Distributed Transaction Management (EL, HFK, AS), pp. 88–97.
VLDBVLDB-1991-MohanN #performance #transaction
Recovery and Coherency-Control Protocols for Fast Intersystem Page Transfer and Fine-Granularity Locking in a Shared Disks Transaction Environment (CM, IN), pp. 193–207.
CHICHI-1991-RudnickyH #interactive #modelling #recognition #speech
Models for evaluating interaction protocols in speech recognition (AIR, AGH), pp. 285–291.
TAPSOFTCCPSD-1991-Cardell-Oliver #higher-order #logic #modelling #realtime #using
Using Higher Order Logic for Modelling Real-Time Protocols (RCO), pp. 259–282.
ICTSSIWPTS-1991-CavalliK #consistency #generative #graph grammar #term rewriting #testing #using
Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
ICTSSIWPTS-1991-ChansonL #on the #testing
On Static and Dynamic Test Case Selections in Protocol Confomance Testing (STC, QL), pp. 255–266.
ICTSSIWPTS-1991-CorbiS #embedded #testing
Common Abstract Test Suite for the Connection Oriented Presentation Protocol Embedded Under Different Application Contexts (CC, GS), pp. 143–149.
ICTSSIWPTS-1991-Petrenko
Checking Experiments with Protocol Machines (AP), pp. 83–94.
ICTSSIWPTS-1991-TretmansKB #consistency #formal method #testing
Protocol Conformance Testing: A Formal Perspective on ISO IS-9646 (JT, PK, EB), pp. 131–142.
ICTSSIWPTS-1991-VuongA #communication #metric #on the #test coverage
On Test Coverage Metrics for Communication Protocols (STV, JAC), pp. 31–45.
SIGMODSIGMOD-1990-BadrinathR #concurrent #evaluation #multi #performance #semantics
Performance Evaluation of Semantics-based Multilevel Concurrency Control Protocols (BRB, KR), pp. 163–172.
VLDBVLDB-1990-AgrawalA #approach #performance
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data (DA, AEA), pp. 243–254.
OOPSLAOOPSLA-ECOOP-1990-Paepcke #named #testing
PCLOS: Stress Testing CLOS Experiencing the Metaobject Protocol (AP), pp. 194–211.
STOCSTOC-1990-BeaverMR #complexity
The Round Complexity of Secure Protocols (DB, SM, PR), pp. 503–513.
STOCSTOC-1990-FeigeS
Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
CAVCAV-1990-LaiPD #on the #using #verification
On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
CAVCAV-1990-LloretAV #communication #composition #design #petri net #using #verification
Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
CAVCAV-1990-LoewensteinD #higher-order #logic #multi #simulation #using #verification
Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
HTHT-1989-Pearl
Sun’s Link Service: A Protocol for Open Linking (AP), pp. 137–146.
CHICHI-1989-KnoxBL #design #user interface
Directed dialogue protocols: verbal data for user interface design (STK, WAB, EFL), pp. 283–287.
OOPSLAOOPSLA-1989-BosL #named #parallel
PROCOL — A Parallel Object Language with Protocols (JvdB, CL), pp. 95–102.
SOSPSOSP-1989-SrinivasanM
Spritely NFS: Experiments with Cache-Consistency Protocols (VS, JCM), pp. 45–57.
TAPSOFTCCIPL-1989-AntonB #petri net #process #specification #verification
Formulas, Processes, and Petri-Nets Applied to the Specification and Verification of a HDLC Protocol (MDA, MB), pp. 140–154.
STOCSTOC-1989-BabaiNS #multi #pseudo #sequence
Multiparty Protocols and Logspace-hard Pseudorandom Sequences (LB, NN, MS), pp. 1–11.
STOCSTOC-1989-RabinB #multi
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (TR, MBO), pp. 73–85.
PODSPODS-1988-Kelter #concurrent #queue
The Queue Protocol: A Deadlock-free Homogeneous Non-Two-Phase Locking Protocol (UK), pp. 142–151.
SIGMODSIGMOD-1988-AbbadiT #concurrent #paradigm
The Group Paradigm for Concurrency Control Protocols (AEA, ST), pp. 126–134.
ICALPICALP-1988-Tel #verification
Assertional Verification of a Timer Based Protocol (GT), pp. 600–614.
STOCSTOC-1988-ChaumCD #multi
Multiparty Unconditionally Secure Protocols (DC, CC, ID), pp. 11–19.
PODSPODS-1987-Hadzilacos #analysis
A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
ICALPICALP-1987-LarsenM #bisimulation #using #verification
Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
HCIHCI-CE-1987-LuekePB #analysis #requirements
User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
STOCSTOC-1987-GoldreichMW #game studies #how #theorem
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority (OG, SM, AW), pp. 218–229.
STOCSTOC-1987-HastadLR #analysis #multi
Analysis of Backoff Protocols for Multiple Access Channels (JH, FTL, BR), pp. 241–253.
LISPLFP-1986-LermenM #distributed
A Protocol for Distributed Reference Counting (CWL, DM), pp. 343–350.
PODSPODS-1985-AbbadiSC #data transformation #fault tolerance #performance
An Efficient, Fault-Tolerant Protocol for Replicated Data Management (AEA, DS, FC), pp. 215–229.
PODSPODS-1985-Ramarao #commit #complexity #on the
On the Complexity of Commit Protocols (KVSR), pp. 235–244.
ICALPICALP-1985-Ben-OrGMR #contract
A Fair Protocol for Signing Contracts (MBO, OG, SM, RLR), pp. 43–52.
STOCSTOC-1985-Bracha #random
An O(lg n) Expected Rounds Randomized Byzantine Generals Protocol (GB), pp. 316–326.
PODSPODS-1984-BuckleyS #concurrent #graph #using
Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
POPLPOPL-1984-ShashaPE #network #verification
Temporal Verification of Carrier-Sense Local Area Network Protocols (DS, AP, WE), pp. 54–65.
STOCSTOC-1984-Awerbuch #network #performance
An Efficient Network Synchronization Protocol (BA), pp. 522–525.
STOCSTOC-1984-Willard
Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (DEW), pp. 512–521.
PODSPODS-1983-PetersonS
LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
SIGMODSIGMOD-1983-WilmsLS #distributed #execution #quote
“I wish I were over there”: Distributed Execution Protocols for Data Definition in R* (PFW, BGL, PGS), pp. 238–242.
VLDBVLDB-1983-BuckleyS #database #multi
Obtaining Progressive Protocols for a Simple Multiversion Database Model (GNB, AS), pp. 74–80.
VLDBVLDB-1983-DasguptaK #concurrent #database
A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases (PD, ZMK), pp. 92–94.
STOCSTOC-1983-ChandraFL83b #multi
Multi-Party Protocols (AKC, MLF, RJL), pp. 94–99.
PODSPODS-1982-MenasceN #commit #evaluation #performance
Performance Evaluation of a Two-Phase Commit Based Protocol for DDBS (DAM, TN), pp. 247–255.
PODSPODS-1982-MohanFS #commutative
Compatibility and Commutativity in Non-two-phase Locking Protocols (CM, DSF, AS), pp. 283–292.
SIGMODSIGMOD-1982-Cooper #analysis #commit #distributed
Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
VLDBVLDB-1982-KedemMS #concurrent #performance
An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols (ZMK, CM, AS), pp. 91–97.
ICSEICSE-1982-ChibaKK #communication
A Model for Description of Communication Protocol (KC, KK, AK), pp. 424–428.
ICSEICSE-1982-MiyazawaOK #communication
The Portable Communication Protocol Program COMPAS for Data Terminal Systems (KM, MO, SK), pp. 420–421.
ICSEICSE-1982-ShiratoriGN #communication #design
A New Design Language for Communication Protocols and a Systematic Design Method of Communication Systems (NS, JG, SN), pp. 403–413.
STOCSTOC-1982-DeMilloLM #encryption
Cryptographic Protocols (RAD, NAL, MM), pp. 383–400.
SIGMODSIGMOD-1981-Skeen #commit
Nonblocking Commit Protocols (DS), pp. 133–142.
VLDBVLDB-1981-FussellKS #database #formal method
A Theory of Correct Locking Protocols for Database Systems (DSF, ZMK, AS), pp. 112–124.
ICSEICSE-1981-BaerGGR #modelling #proving #specification
The Two-Step Commitment Protocol: Modeling, Specification and Proof Methodology (JLB, GG, CG, GR), pp. 363–373.
VLDBVLDB-1980-KedemS
Non-Two-Phase Locking Protocols with Shared and Exclusive Locks (ZMK, AS), pp. 309–317.
SIGMODSIGMOD-1978-MenascePM #coordination #database #distributed
A Locking Protocol for Resource Coordination in Distributed Databases (DAM, GJP, RRM), p. 2.
ICSEICSE-1976-GoudaM #analysis #design #modelling #on the
On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.