BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
secur (101)
verif (100)
base (96)
test (81)
use (81)

Stem protocol$ (all stems)

786 papers:

SIGMODSIGMOD-2015-0002KBDHKFG #coordination #program analysis #protocol #transaction
The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
ICPCICPC-2015-SunshineHA #api #protocol #usability
Searching the state space: a qualitative study of API protocol usability (JS, JDH, JA), pp. 82–93.
PLDIPLDI-2015-MarrSD #metaprogramming #performance #protocol
Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
STOCSTOC-2015-BassilyS #performance #protocol
Local, Private, Efficient Protocols for Succinct Histograms (RB, ADS), pp. 127–135.
ICALPICALP-v1-2015-CzyzowiczGKKSU #convergence #on the #protocol
On Convergence and Threshold Properties of Discrete Lotka-Volterra Population Protocols (JC, LG, AK, EK, PGS, PU), pp. 393–405.
ICALPICALP-v2-2015-AlistarhG #polynomial #protocol
Polylogarithmic-Time Leader Election in Population Protocols (DA, RG), pp. 479–491.
FMFM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FMFM-2015-FengHTZ #model checking #named #protocol #quantum #source code
QPMC: A Model Checker for Quantum Programs and Protocols (YF, EMH, AT, LZ), pp. 265–272.
FMFM-2015-LiSLD #protocol #security #verification
Verifying Parameterized Timed Security Protocols (LL, JS, YL, JSD), pp. 342–359.
SEFMSEFM-2015-Vanspauwen0 #encryption #implementation #library #protocol #specification #verification
Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specifications (GV, BJ), pp. 53–68.
CHICHI-2015-JacksonB #development #interactive #protocol #standard
Standards and/as Innovation: Protocols, Creativity, and Interactive Systems Development in Ecology (SJJ, SB), pp. 1769–1778.
HCIHCI-DE-2015-ChomaZB #communication #design #heuristic #protocol #usability
Communication of Design Decisions and Usability Issues: A Protocol Based on Personas and Nielsen’s Heuristics (JC, LAMZ, DB), pp. 163–174.
KDDKDD-2015-Pratt #machine learning #predict #protocol #proving
Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts (KBP), pp. 2049–2058.
SEKESEKE-2015-ChenZWQJW #api #mining #protocol
Extracting More Object Usage Scenarios for API Protocol Mining (DC, YZ, RW, BQ, JJ, WW), pp. 607–612.
ECOOPECOOP-2015-BurckhardtLPF #abstraction #protocol #robust #sequence
Global Sequence Protocol: A Robust Abstraction for Replicated Shared State (SB, DL, JP, MF), pp. 568–590.
OOPSLAOOPSLA-2015-LopezMMNSVY #message passing #parallel #source code #verification
Protocol-based verification of message-passing parallel programs (HAL, ERBM, FM, NN, CS, VTV, NY), pp. 280–298.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-IvakiLA #protocol #reliability #taxonomy
A taxonomy of reliable request-response protocols (NI, NL, FA), pp. 456–463.
SACSAC-2015-RrushiFNHCP #protocol #specification
By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
CCCC-2015-NgCY #code generation #protocol
Protocols by Default — Safe MPI Code Generation Based on Session Types (NN, JGdFC, NY), pp. 212–232.
HPCAHPCA-2015-MenezoPG #energy #hybrid #performance #protocol #scalability
Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability (LGM, VP, JÁG), pp. 198–209.
ISMMISMM-2015-OsterlundL #concurrent #protocol #using
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
CAVCAV-2015-AlurRSTU #automation #distributed #protocol #symmetry
Automatic Completion of Distributed Protocols with Symmetry (RA, MR, CS, ST, AU), pp. 395–412.
TAPTAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing #using
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-DijkR #protocol
Protocol attacks on advanced PUF protocols and countermeasures (MvD, UR), pp. 1–6.
DATEDATE-2014-JaksicC #energy #how #protocol
DRAM-based coherent caches and how to take advantage of the coherence protocol to reduce the refresh energy (ZJ, RC), pp. 1–4.
DATEDATE-2014-NuzzoFIS #contract #cyber-physical #design #protocol #safety
Contract-based design of control protocols for safety-critical cyber-physical systems (PN, JBF, AI, ALSV), pp. 1–4.
DATEDATE-2014-ZebeleinHFST #communication #modelling #multi #protocol
Model-based actor multiplexing with application to complex communication protocols (CZ, CH, JF, TS, JT), pp. 1–4.
TACASTACAS-2014-Ardeshir-LarijaniGN #concurrent #equivalence #protocol #quantum #verification
Verification of Concurrent Quantum Protocols by Equivalence Checking (EAL, SJG, RN), pp. 500–514.
STOCSTOC-2014-HaitnerT #protocol
An almost-optimally fair three-party coin-flipping protocol (IH, ET), pp. 408–416.
STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
FMFM-2014-BonakdarpourHK #authentication #automation #knowledge-based #protocol
Knowledge-Based Automated Repair of Authentication Protocols (BB, RH, SSK), pp. 132–147.
FMFM-2014-DuggiralaWMVM #modelling #parallel #precedence #protocol
Temporal Precedence Checking for Switched Models and Its Application to a Parallel Landing Protocol (PSD, LW, SM, MV, CAM), pp. 215–229.
IFMIFM-2014-BruniSNN #analysis #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
GRAPHITEGRAPHITE-2014-DelzannoRT #analysis #protocol
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
ICGTICGT-2014-Delzanno #distributed #model checking #protocol #verification
Parameterized Verification and Model Checking for Distributed Broadcast Protocols (GD), pp. 1–16.
CHICHI-2014-PikeMPSW #protocol #using
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
AdaEuropeAdaEurope-2014-JaouenBPR #protocol
PDP 4PS : Periodic-Delayed Protocol for Partitioned Systems (AJ, EB, LP, TR), pp. 149–165.
ICEISICEIS-v3-2014-LaraC #integration #protocol
A Protocol for Command and Control Systems Integration (PL, RC), pp. 484–489.
SEKESEKE-2014-CheMLC #network #online #protocol #runtime #testing
Testing Network Protocols: formally, at runtime and online (XC, SM, JL, ARC), pp. 90–93.
SEKESEKE-2014-DingSZ #development #protocol
Development of A Sliding Window Protocol for Data Synchronization in a Flow Cytometer (JD, YS, DZ), pp. 626–631.
SIGIRSIGIR-2014-CormackG #bibliography #evaluation #protocol
Evaluation of machine-learning protocols for technology-assisted review in electronic discovery (GVC, MRG), pp. 153–162.
ECOOPECOOP-2014-MilitaoAC #protocol
Rely-Guarantee Protocols (FM, JA, LC), pp. 334–359.
ECOOPECOOP-2014-PrincehouseCJBFS #architecture #composition #named #protocol
MiCA: A Compositional Architecture for Gossip Protocols (LP, RC, ZJ, KPB, NF, RS), pp. 644–669.
ECOOPECOOP-2014-SunshineHA #documentation #empirical #programming #protocol
Structuring Documentation to Support State Search: A Laboratory Experiment about Protocol Programming (JS, JDH, JA), pp. 157–181.
OOPSLAOOPSLA-2014-TuronVD #memory management #named #navigation #protocol
GPS: navigating weak memory with ghosts, protocols, and separation (AT, VV, DD), pp. 691–707.
LOPSTRLOPSTR-2014-TahatE #hybrid #protocol #self #synthesis #verification
A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
SACSAC-2014-Daniel #communication #protocol #using
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-HeimfarthGFA #latency #named #protocol
GB-MAC: a backbone based low latency protocol for WSNs (TH, JCG, AVF, JPdA), pp. 692–698.
SACSAC-2014-SantosBAP #health #protocol
Integrating IEEE 11073 and constrained application protocol for personal health devices (DFSS, FB, HOA, AP), pp. 466–467.
SACSAC-2014-SuzakiYTOS #protocol #testing #virtual machine
Rollback mechanism of nested virtual machines for protocol fuzz testing (KS, TY, AT, YO, ES), pp. 1484–1491.
SACSAC-2014-WenD #performance #protocol
Efficient protocols for private record linkage (ZW, CD), pp. 1688–1694.
HPCAHPCA-2014-ZhangBES #design #named #protocol #scalability #verification
PVCoherence: Designing flat coherence protocols for scalable verification (MZ, JDB, JE, DJS), pp. 392–403.
ICSTICST-2014-JohanssonSLAG #fuzzing #modelling #named #protocol #robust #testing
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols (WJ, MS, UEL, MA, VG), pp. 323–332.
SMTSMT-2014-CarlssonGP #analysis #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
VMCAIVMCAI-2014-JezequelE #algorithm #distributed #message passing #protocol #verification
Message-Passing Algorithms for the Verification of Distributed Protocols (LJ, JE), pp. 222–241.
ITiCSEITiCSE-2013-FeasterAZH #algorithm #education #network #protocol
Serious toys II: teaching networks, protocols, and algorithms (YF, FA, JZ, JOH), pp. 273–278.
FASEFASE-2013-BongiovanniH #protocol
A Mechanized Model for CAN Protocols (FB, LH), pp. 266–281.
TACASTACAS-2013-Ardeshir-LarijaniGN #equivalence #protocol #quantum
Equivalence Checking of Quantum Protocols (EAL, SJG, RN), pp. 478–492.
PLDIPLDI-2013-UdupaRDMMA #named #protocol #specification
TRANSIT: specifying protocols with concolic snippets (AU, AR, JVD, SMH, MMKM, RA), pp. 287–296.
ICALPICALP-v2-2013-ChretienCD #automaton #protocol #security
From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
IFMIFM-2013-MeryP #formal method #modelling #protocol #verification
Formal Modelling and Verification of Population Protocols (DM, MP), pp. 208–222.
SEFMSEFM-2013-OliveiraJW #csp #multi #protocol
A Verified Protocol to Implement Multi-way Synchronisation and Interleaving in CSP (MVMO, ISdMJ, JW), pp. 46–60.
HCIDUXU-PMT-2013-FebrettiLSJKW #component #evaluation #interface #protocol
A Component-Based Evaluation Protocol for Clinical Decision Support Interfaces (AF, KDL, JS, AEJ, GMK, DJW), pp. 232–241.
HCIHCI-AS-2013-HuaG #comprehension #difference #evaluation #predict #protocol #safety #usability
Usability Evaluation of a Voluntary Patient Safety Reporting System: Understanding the Difference between Predicted and Observed Time Values by Retrospective Think-Aloud Protocols (LH, YG), pp. 94–100.
HCIHCI-IMT-2013-CarrinoRIKM #gesture #protocol
Gesture vs. Gesticulation: A Test Protocol (FC, AR, RI, OAK, EM), pp. 157–166.
CAiSECAiSE-2013-YuHGV #composition #framework #protocol #testing #web #web service
A Business Protocol Unit Testing Framework for Web Service Composition (JY, JH, SOG, SV), pp. 17–34.
SACSAC-2013-AllaniGP #hybrid #named #protocol
Hyphen: a hybrid protocol for generic overlay construction in P2P environments (MA, BG, PP), pp. 423–430.
SACSAC-2013-AnconaBM #consistency #dynamic analysis #multi #protocol
Constrained global types for dynamic checking of protocol conformance in multi-agent systems (DA, MB, VM), pp. 1377–1379.
SACSAC-2013-BrancoLR #bound #protocol #scalability
Bounded gossip: a gossip protocol for large-scale datacenters (MB, JL, LR), pp. 591–596.
SACSAC-2013-GouwBJW #case study #industrial #java #runtime #source code
Run-time checking of data- and protocol-oriented properties of Java programs: an industrial case study (SdG, FSdB, EBJ, PYHW), pp. 1573–1578.
SACSAC-2013-HoangLCMC #network #protocol
A backward-compatible protocol for inter-routing over heterogeneous overlay networks (GNH, LL, VC, PM, HNC), pp. 649–651.
SACSAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
ICSEICSE-2013-InverardiT #automation #composition #protocol #synthesis
Automatic synthesis of modular connectors via composition of protocol mediation patterns (PI, MT), pp. 3–12.
PPoPPPPoPP-2013-DiouriGLC #energy #fault tolerance #protocol #towards
Towards an energy estimator for fault tolerance protocols (MeMD, OG, LL, FC), pp. 313–314.
PPoPPPPoPP-2013-LifflanderMK #detection #fault tolerance #protocol #termination
Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
CADECADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #protocol #symmetry #unification
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAVCAV-2013-MeierSCB #analysis #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-SosnovichGN #network #protocol #security #using
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
ICTSSICTSS-2013-PellegrinoCM #developer #protocol #security
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
VMCAIVMCAI-2013-BiondiLMW #information management #protocol #random
Quantifying Information Leakage of Randomized Protocols (FB, AL, PM, AW), pp. 68–87.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
DATEDATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid #protocol
Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATEDATE-2012-QinM #automation #generative #protocol #testing
Automated generation of directed tests for transition coverage in cache coherence protocols (XQ, PM), pp. 3–8.
DATEDATE-2012-YangCJTZ #multi #protocol #smarttech
A multi-parameter bio-electric ASIC sensor with integrated 2-wire data transmission protocol for wearable healthcare system (GY, JC, FJ, HT, LRZ), pp. 443–448.
ESOPESOP-2012-ChadhaCK #automation #encryption #equivalence #protocol #verification
Automated Verification of Equivalence Properties of Cryptographic Protocols (RC, SC, SK), pp. 108–127.
IFMIFM-2012-GarisPCR #alloy #protocol #specification #state machine #uml
Specifying UML Protocol State Machines in Alloy (AGG, ACRP, AC, DR), pp. 312–326.
ICFPICFP-2012-LaunchburyDDA #multi #performance #protocol
Efficient lookup-table protocol in secure multiparty computation (JL, ISD, TD, AAM), pp. 189–200.
HILTHILT-2012-LiSRM #analysis #protocol #realtime #scheduling
Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
ICEISICEIS-v1-2012-BrzostowskiK #multi #performance #protocol
Efficient Multi-alternative Protocol for Multi-attribute Agent Negotiation (JB, RK), pp. 247–252.
ICEISICEIS-v2-2012-PradoFFFL #protocol #towards
Towards a Negotiation Protocol for ebXML (HAdP, EF, GJdLF, AHF, NCL), pp. 277–282.
CIKMCIKM-2012-JinCKLZ #protocol #query
A filter-based protocol for continuous queries over imprecise location data (YJ, RC, BK, KyL, YZ), pp. 365–374.
KEODKEOD-2012-HeardK #modelling #protocol #requirements
Modelling Agent Protocol Requirements (JH, RCK), pp. 335–338.
KRKR-2012-FelliGL #ltl #multi #protocol #specification
Synthesizing Agent Protocols From LTL Specifications Against Multiple Partially-Observable Environments (PF, GDG, AL).
ECMFAECMFA-2012-HamannHG #monitoring #ocl #protocol #runtime #state machine
OCL-Based Runtime Monitoring of Applications with Protocol State Machines (LH, OH, MG), pp. 384–399.
QAPLQAPL-2012-BelardinelliGL #automation #protocol #quantum #using #verification
Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
SACSAC-2012-NgWZ #protocol
Private data deduplication protocols in cloud storage (WKN, YW, HZ), pp. 441–446.
SACSAC-2012-RahmanA #authentication #named #network #protocol #robust
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
SACSAC-2012-SalaunEPBC #distributed #in the cloud #protocol #self #verification
Verification of a self-configuration protocol for distributed applications in the cloud (GS, XE, NDP, FB, TC), pp. 1278–1283.
SACSAC-2012-SalomoniMPM #named #protocol
S2S: a peer to peer protocol for participative sensing (PS, LAM, GP, MM), pp. 634–635.
SACSAC-2012-ZhangI #protocol #trust #web #web service #xml
An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
ICSEICSE-2012-PradelJAG #api #consistency #multi #protocol #specification
Statically checking API protocol conformance with mined multi-object specifications (MP, CJ, JA, TRG), pp. 925–935.
ICSTICST-2012-ChrzaszczCST #evolution #protocol #testing
Testing of Evolving Protocols (JC, PC, AS, AT), pp. 901–906.
ICSTICST-2012-GansR #protocol #smarttech #testing
The SmartLogic Tool: Analysing and Testing Smart Card Protocols (GdKG, JdR), pp. 864–871.
ICSTICST-2012-Woehrle #network #protocol #search-based #testing
Search-Based Stress Testing of Wireless Network Protocol Stacks (MW), pp. 794–803.
ICTSSICTSS-2012-ChenV #protocol #testing
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
ICTSSICTSS-2012-HiromoriUYH #evaluation #performance #protocol #testing
Protocol Testing and Performance Evaluation for MANETs with Non-uniform Node Density Distribution (AH, TU, HY, TH), pp. 231–246.
IJCARIJCAR-2012-DelauneKP #constraints #protocol #security
Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
LICSLICS-2012-Vicary #protocol #quantum #semantics
Higher Semantics of Quantum Protocols (JV), pp. 606–615.
TAPTAP-2012-ArmandoPCMB #automation #model checking #protocol #security #testing
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap (AA, GP, RC, AM, DB), pp. 3–18.
VMCAIVMCAI-2012-ChatterjeeR #contract #protocol
Synthesizing Protocols for Digital Contract Signing (KC, VR), pp. 152–168.
CBSECBSE-2011-HeinzemannH #adaptation #architecture #communication #component #embedded #protocol #reuse #self
Reusing dynamic communication protocols in self-adaptive embedded component architectures (CH, SH), pp. 109–118.
QoSAQoSA-ISARCS-2011-FranksLH #metric #modelling #performance #protocol
Performance measurements and modeling of a java-based session initiation protocol (SIP) application server (GF, DHL, CEH), pp. 63–72.
DATEDATE-2011-GoswamiSC #communication #cyber-physical #hybrid #protocol #re-engineering
Re-engineering cyber-physical control applications for hybrid communication protocols (DG, RS, SC), pp. 914–919.
TACASTACAS-2011-RavnSV #modelling #process #protocol #verification #web #web service
Modelling and Verification of Web Services Business Activity Protocol (APR, JS, SV), pp. 357–371.
WCREWCRE-2011-AntunesNV #network #protocol #reverse engineering
Reverse Engineering of Protocols from Network Traces (JA, NFN, PV), pp. 169–178.
WCREWCRE-2011-ScholzK #multi #protocol #source code #thread
Object-Based Dynamic Protocol Recovery for Multi-Threading Programs (BS, RK), pp. 251–260.
PEPMPEPM-2011-WangG #embedded #programming #protocol
An embedded language for programming protocol stacks in embedded systems (YW, VG), pp. 63–72.
STOCSTOC-2011-Goyal #constant #protocol #using
Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
STOCSTOC-2011-Woodruff #approximate #black box #protocol
Near-optimal private approximation protocols via a black box transformation (DPW), pp. 735–744.
FMFM-2011-BoyerGS #configuration management #protocol #specification #verification
Specifying and Verifying the SYNERGY Reconfiguration Protocol with LOTOS NT and CADP (FB, OG, GS), pp. 103–117.
SEFMSEFM-2011-BorgstromHJRVPP #calculus #protocol
Broadcast Psi-calculi with an Application to Wireless Protocols (JB, SH, MJ, PR, BV, JÅP, JP), pp. 74–89.
CHICHI-2011-Freeman #eye tracking #protocol #usability #using
Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CSCWCSCW-2011-ShaoLLG #protocol #web
An operational transformation based synchronization protocol for web 2.0 applications (BS, DL, TL, NG), pp. 563–572.
HCIDUXU-v2-2011-Cai #assessment #human-computer #interactive #protocol
A Camera-Aided Legibility Assessment Protocol of Displays for Enhanced Human-Computer Interaction (HC), pp. 359–367.
HCIHIMI-v1-2011-Pavel #analysis #authentication #case study #protocol
Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
HCIHIMI-v1-2011-Pavel11a #approach #composition #design #protocol #security
An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
HCIHIMI-v1-2011-PavelJ #approach #authentication #design #logic #protocol
Routing Functionality in the Logic Approach for Authentication Protocol Design (OP, HJ), pp. 366–373.
HCIHIMI-v2-2011-BrandtLDBJ #communication #protocol
Flight Deck Workload and Acceptability of Verbal and Digital Communication Protocols (SLB, JL, AQVD, VB, WWJ), pp. 463–472.
KDIRKDIR-2011-BicegoFBCM #grid #protocol
An Innovative Protocol for Comparing Protein Binding Sites via Atomic Grid Maps (MB, ADF, PB, AC, VM), pp. 413–422.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #using #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #using #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
ECOOPECOOP-2011-BeckmanKA #empirical #protocol
An Empirical Study of Object Protocols in the Wild (NEB, DK, JA), pp. 2–26.
PLATEAUPLATEAU-2011-JaspanA #developer #empirical #protocol
Are object protocols burdensome?: an empirical study of developer forums (CJ, JA), pp. 51–56.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification #using
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
POPLPOPL-2011-SchwarzSVLM #protocol #source code #static analysis
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol (MDS, HS, VV, PL, MMO), pp. 93–104.
SACSAC-2011-LiuWYL #modelling #protocol #scalability
Scalable CP-nets modeling for BitTorrent protocol (JL, HW, XY, JL), pp. 542–543.
SACSAC-2011-MacielH #commit #protocol #rest
Extending timestamp-based two phase commit protocol for RESTful services to meet business rules (LAHdSM, CMH), pp. 778–785.
SACSAC-2011-MunizL #encryption #on the #protocol #recognition
On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
SACSAC-2011-OuederniSP #interactive #protocol
Measuring the compatibility of service interaction protocols (MO, GS, EP), pp. 1560–1567.
HPCAHPCA-2011-VantreaseLB #protocol
Atomic Coherence: Leveraging nanophotonics to build race-free cache coherence protocols (DV, MHL, NLB), pp. 132–143.
HPDCHPDC-2011-AhujaBFGS #modelling #protocol
Introspective end-system modeling to optimize the transfer time of rate based protocols (VA, AB, MKF, DG, GS), pp. 61–72.
CADECADE-2011-ArnaudCD #protocol #recursion #security #testing
Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
ICSTICST-2011-DadeauHK #generative #protocol #security #testing
Mutation-Based Test Generation from Security Protocols in HLPSL (FD, PCH, RK), pp. 240–248.
DATEDATE-2010-CaoN #markov #protocol
High-fidelity markovian power model for protocols (JC, AN), pp. 267–270.
VLDBVLDB-2010-ChenOZ #adaptation #database #protocol
An Adaptive Updating Protocol for Reducing Moving Object Databases Workload (SC, BCO, ZZ), pp. 735–746.
TACASTACAS-2010-AvnitSP #automation #named #protocol #synthesis
ACS: Automatic Converter Synthesis for SoC Bus Protocols (KA, AS, JP), pp. 343–348.
SEFMSEFM-2010-BenettiMV #ad hoc #model checking #network #protocol
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA (DB, MM, LV), pp. 191–202.
CHICHI-2010-Olmsted-HawalaMHA #comparison #protocol #testing #usability #web
Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability (ELOH, EDM, SH, KTA), pp. 2381–2390.
CIKMCIKM-2010-RonenS10a #concurrent #network #protocol #social
Concurrent atomic protocols for making and changing decisions in social networks (RR, OS), pp. 1337–1340.
SEKESEKE-2010-Bouabana-TebibelGM #ad hoc #protocol
Secure ad-hoc routing protocol (TBT, RNG, SM), pp. 771–776.
PADLPADL-2010-WangG #approach #domain-specific language #implementation #protocol #stack
A Domain-Specific Language Approach to Protocol Stack Implementation (YW, VG), pp. 183–185.
POPLPOPL-2010-BhargavanFG #composition #protocol #security #type system #verification
Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
SACSAC-2010-CostaMB #consistency #database #distributed #mobile #protocol
A distributed protocol for ensuring replicated database consistency in mobile computing environments (AC, JMM, AB), pp. 1688–1693.
SACSAC-2010-HoqueRA #named #protocol #scalability #using
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-JungCKCGK #interface #multi #network #protocol #stack
Virtual protocol stack interface for multiple wireless sensor network simulators (JJ, YC, YK, YC, BG, JK), pp. 240–241.
SACSAC-2010-SenguptaMS #multi #named #network #protocol
MMSRP: multi-wavelength Markov-based split reservation protocol for DWDM optical networks (MS, SKM, DS), pp. 689–693.
HPCAHPCA-2010-RomanescuLSB #protocol
UNified Instruction/Translation/Data (UNITD) coherence: One protocol to rule them all (BFR, ARL, DJS, AB), pp. 1–12.
PPoPPPPoPP-2010-HoeflerSL #communication #protocol #scalability
Scalable communication protocols for dynamic sparse data exchange (TH, CS, AL), pp. 159–168.
CSLCSL-2010-BasinC #protocol #security
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
ICSTICST-2010-PorresR #contract #nondeterminism #protocol #uml
From Nondeterministic UML Protocol Statemachines to Class Contracts (IP, IR), pp. 107–116.
ICTSSICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol #using
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
CASECASE-2009-ChavanZK #authentication #protocol
A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
DATEDATE-2009-AvnitS #approach #design #formal method #protocol
A formal approach to design space exploration of protocol converters (KA, AS), pp. 129–134.
DATEDATE-2009-EbrahimiDNMAPT #multi #protocol
An efficent dynamic multicast routing protocol for distributing traffic in NOCs (ME, MD, MHN, SM, AAK, JP, HT), pp. 1064–1069.
DATEDATE-2009-FourmigueGNA #design #framework #protocol
Co-simulation based platform for wireless protocols design explorations (AF, BG, GN, EMA), pp. 874–877.
DATEDATE-2009-LiNZGSS #dependence #optimisation #protocol
Optimizations of an application-level protocol for enhanced dependability in FlexRay (WL, MDN, WZ, PG, ALSV, SAS), pp. 1076–1081.
DATEDATE-2009-MollCRB #modelling #performance #protocol #using
Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATEDATE-2009-SinhaRBS #design #multi #protocol #using
Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATEDATE-2009-ZiermannWT #network #protocol
CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16× higher data rates (TZ, SW, JT), pp. 1088–1093.
DocEngDocEng-2009-BoyerWA #documentation #interactive #protocol #rest #web
A REST protocol and composite format for interactive web documents (JMB, CW, RPA), pp. 139–148.
ICDARICDAR-2009-SlimaneIKAH #database #evaluation #image #protocol
A New Arabic Printed Text Image Database and Evaluation Protocols (FS, RI, SK, AMA, JH), pp. 946–950.
WRLAWRLA-2008-RiescoV09 #implementation #maude #protocol
Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol (AR, AV), pp. 249–266.
ESOPESOP-2009-KikuchiK #authentication #automation #encryption #protocol #type system #verification
Type-Based Automated Verification of Authenticity in Cryptographic Protocols (DK, NK), pp. 222–236.
FoSSaCSFoSSaCS-2009-Guttman #authentication #composition #encryption #protocol #testing
Cryptographic Protocol Composition via the Authentication Tests (JDG), pp. 303–317.
CIAACIAA-2009-CaoN #case study #protocol
Formally Synthesising a Protocol Converter: A Case Study (JC, AN), pp. 249–252.
ICALPICALP-v2-2009-ChatzigiannakisMS #protocol
Mediated Population Protocols (IC, OM, PGS), pp. 363–374.
FMFM-2009-HeidarianSV #analysis #network #protocol
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
SEFMSEFM-2009-AndresMN #protocol #testing
Applying Formal Passive Testing to Study Temporal Properties of the Stream Control Transmission Protocol (CA, MGM, MN), pp. 73–82.
SEFMSEFM-2009-LienO #analysis #formal method #modelling #multi #protocol
Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
CHICHI-2009-MankowskiBSS #behaviour #canonical #protocol
Finding canonical behaviors in user protocols (WCM, PB, AS, DDS), pp. 1323–1326.
HCIHCI-AUII-2009-ZarraonandiaVDA #learning #protocol
A Virtual Environment for Learning Aiport Emergency Management Protocols (TZ, MRRV, PD, IA), pp. 228–235.
HCIHCI-VAD-2009-ChisnellBLL #protocol #usability
Usability for Poll Workers: A Voting System Usability Test Protocol (DC, KB, SJL, SL), pp. 458–467.
HCIHIMI-DIE-2009-LeeKSC #framework #multi #protocol
A Framework for Fairness Guaranteed Multi-streaming Transport Protocol (WL, HK, DWS, JC), pp. 553–562.
HCIHIMI-II-2009-KimMC #clustering #network #protocol #using
A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
ECOOPECOOP-2009-BierhoffBA #api #protocol
Practical API Protocol Checking with Access Permissions (KB, NEB, JA), pp. 195–219.
SACSAC-2009-CavalliMO #approach #consistency #protocol #testing
A passive conformance testing approach for a MANET routing protocol (ARC, SM, EMdO), pp. 207–211.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-Hurlin #parallel #protocol #specification #thread
Specifying and checking protocols of multithreaded classes (CH), pp. 587–592.
SACSAC-2009-KerschbaumDSB #communication #complexity #multi #on the #protocol
On the practical importance of communication complexity for secure multi-party computation protocols (FK, DD, AS, DB), pp. 2008–2015.
SACSAC-2009-KokashCRI #flexibility #network #protocol
A flexible QoS-aware routing protocol for infrastructure-less B3G networks (NK, RSC, PGR, VI), pp. 212–216.
SACSAC-2009-OliveiraA #named #protocol
NECTAR: a DTN routing protocol based on neighborhood contact history (ECRdO, CVNdA), pp. 40–46.
SACSAC-2009-PassitoMM #analysis #network #protocol #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-ReinkeHNGLL #network #protocol #standard #transaction
Integrating standardized transaction protocols in service-oriented wireless sensor networks (CR, NH, JN, SG, VL, ML), pp. 2202–2203.
SACSAC-2009-ZaidiBC #network #protocol #testing
Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
ESEC-FSEESEC-FSE-2009-BertolinoIPT #automation #behaviour #composition #protocol #synthesis
Automatic synthesis of behavior protocols for composable web-services (AB, PI, PP, MT), pp. 141–150.
CADECADE-2009-CiobacaDK #convergence #equation #protocol #security
Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
CAVCAV-2009-AbadiBC #modelling #protocol #proving #security
Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
RTARTA-2009-BursucC #algebra #bound #protocol #security
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
RTARTA-2009-SeidlV #protocol
Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (HS, KNV), pp. 118–132.
VMCAIVMCAI-2009-Cortier #protocol #security #verification
Verification of Security Protocols (VC), pp. 5–13.
CBSECBSE-2008-BothZ #automation #component #consistency #parallel #protocol #recursion
Automatic Protocol Conformance Checking of Recursive and Parallel Component-Based Systems (AB, WZ), pp. 163–179.
WICSAWICSA-2008-LiFWWJ #approach #development #protocol
A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation (XL, YF, JW, LW, FJ), pp. 137–146.
CASECASE-2008-LiuWJ #protocol
A geographic source routing protocol for traffic sensing in urban environment (LL, ZW, WKJ), pp. 347–352.
CASECASE-2008-ScheitererNOSG #performance #precise #protocol
Synchronization performance of the Precision Time Protocol in the face of slave clock frequency drift (RLS, CN, DO, GS, DG), pp. 554–559.
DACDAC-2008-ReshadiGG #case study #design #internet #protocol
C-based design flow: a case study on G.729A for voice over internet protocol (VoIP) (MR, BG, DG), pp. 72–75.
DATEDATE-2008-AvnitDSRP #approach #formal method #problem #protocol
A Formal Approach To The Protocol Converter Problem (KA, VD, AS, SR, SP), pp. 294–299.
DATEDATE-2008-FranchinoBF #protocol
Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme (GF, GCB, TF), pp. 1051–1056.
DATEDATE-2008-GailliardBSV #component #corba #protocol #semantics
Mapping Semantics of CORBA IDL and GIOP to Open Core Protocol for Portability and Interoperability of SDR Waveform Components (GG, HB, MS, FV), pp. 330–335.
DATEDATE-2008-Lotfi-KamranDLN #protocol
BARP-A Dynamic Routing Protocol for Balanced Distribution of Traffic in NoCs (PLK, MD, CL, ZN), pp. 1408–1413.
TACASTACAS-2008-FismanKL #distributed #fault tolerance #on the #protocol #verification
On Verifying Fault Tolerance of Distributed Protocols (DF, OK, YL), pp. 315–331.
TACASTACAS-2008-SaksenaWJ #ad hoc #graph grammar #modelling #protocol #verification
Graph Grammar Modeling and Verification of Ad Hoc Routing Protocols (MS, OW, BJ), pp. 18–32.
SASSAS-2008-RamanathanSGJ #protocol #using
Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
ICALPICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
FMFM-2008-GrandyBSSR #protocol #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
FMFM-2008-RidgeNS #approach #implementation #network #protocol
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service (TR, MN, PS), pp. 294–309.
SEFMSEFM-2008-Salaun #generative #protocol #specification
Generation of Service Wrapper Protocols from Choreography Specifications (GS), pp. 313–322.
SEFMSEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol #using
Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
CAiSECAiSE-2008-SerrourGKB #correlation #interactive #protocol
Message Correlation and Business Protocol Discovery in Service Interaction Logs (BS, DPG, HK, BB), pp. 405–419.
EDOCEDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol #using
Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEISICEIS-DISI-2008-HuangG #api #documentation #protocol #xml
A Locking Protocol for DOM API on XML Documents (YFH, MLG), p. 105–?.
ICEISICEIS-ISAS2-2008-KiyomotoOT #automation #generative #on the fly #protocol #security
On-the-Fly Automatic Generation of Security Protocols (SK, HO, TT), pp. 97–104.
ICEISICEIS-ISAS2-2008-TobarraCPC #protocol #verification
Formal Verification of the Secure Sockets Layer Protocol (MLT, DC, JJP, FC), pp. 246–252.
ICEISICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics
Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEISICEIS-SAIC-2008-VallejoCAG #communication #e-commerce #protocol #standard
Integrating a Standard Communication Protocol into an E-Commerce Environment Based on Intelligent Agents (DV, JJCS, JA, CGM), pp. 55–60.
SEKESEKE-2008-DaiS #online #protocol
QuickPay Online Payment Protocol (JD, MS), pp. 223–226.
SEKESEKE-2008-DuffyHM #c++ #comprehension #evolution #interface #library #protocol #reverse engineering #scalability
Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution Tasks (EBD, JOH, BAM), pp. 303–308.
SEKESEKE-2008-LiuLZL #logic #protocol #security
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
OOPSLAOOPSLA-2008-GopinathanR #analysis #protocol #runtime
Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
SACSAC-2008-AndronickN #embedded #protocol
Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
SACSAC-2008-Armendariz-InigoMMM #database #named #protocol #replication
SIPRe: a partial database replication protocol with SI replicas (JEAI, AMG, JRGdM, FDME), pp. 2181–2185.
SACSAC-2008-MaagG #approach #protocol #self #testing #using
Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SACSAC-2008-SaffarianM #algorithm #novel #protocol
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
ICSEICSE-2008-ReichertKSMH #analysis #network #protocol
A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
ICSEICSE-2008-XiaoLG #distributed #protocol #security
Developing a security protocol for a distributed decision support system in a healthcare environment (LX, PHL, AG), pp. 673–682.
CAVCAV-2008-BackesLMP #abstraction #analysis #protocol #security
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
CAVCAV-2008-Cremers #analysis #protocol #security #verification
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
ICSTICST-2008-GrieskampKMNSW #assurance #documentation #modelling #protocol #quality
Model-Based Quality Assurance of Windows Protocol Documentation (WG, NK, DM, AN, KS, FLW), pp. 502–506.
IJCARIJCAR-2008-Comon-Lundh #automation #challenge #protocol #security #verification
Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
IJCARIJCAR-2008-KremerMT #protocol #proving
Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
LICSLICS-2008-SprengerB #abstraction
Cryptographically-Sound Protocol-Model Abstractions (CS, DAB), pp. 115–129.
VMCAIVMCAI-2008-DimitrovaP #abstraction #lazy evaluation #protocol #question
Is Lazy Abstraction a Decision Procedure for Broadcast Protocols? (RD, AP), pp. 98–111.
DACDAC-2007-BhojwaniM #concurrent #online #protocol #robust
A Robust Protocol for Concurrent On-Line Test (COLT) of NoC-based Systems-on-a-Chip (PB, RNM), pp. 670–675.
DATEDATE-2007-GburzynskiKO #ad hoc #low cost #network #performance #protocol
A tiny and efficient wireless ad-hoc protocol for low-cost sensor networks (PG, BK, WO), pp. 1557–1562.
DATEDATE-2007-MamagkakisSC #design #middleware #optimisation #protocol
Middleware design optimization of wireless protocols based on the exploitation of dynamic input patterns (SM, DS, FC), pp. 1036–1041.
HTHT-2007-AgarwalCKNR #named #protocol
HSTP: hyperspeech transfer protocol (SKA, DC, AK, AAN, NR), pp. 67–76.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #using #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
FASEFASE-2007-SanchezSM #concurrent #distributed #product line #protocol
A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces (CS, HBS, ZM), pp. 155–169.
TACASTACAS-2007-DoghmiGT #encryption #protocol
Searching for Shapes in Cryptographic Protocols (SFD, JDG, FJT), pp. 523–537.
CSMRCSMR-2007-Quante07a #comprehension #graph #process #protocol
Dynamic Object Process Graph Extraction for Program Understanding and Protocol Recovery (JQ), pp. 345–348.
WCREWCRE-2007-QuanteK #protocol
Dynamic Protocol Recovery (JQ, RK), pp. 219–228.
WCREWCRE-2007-ShevertalovM #protocol #reverse engineering
A Reverse Engineering Tool for Extracting Protocols of Networked Applications (MS, SM), pp. 229–238.
STOCSTOC-2007-AndrewsJS #network #protocol #scheduling
Stability of the max-weight routing and scheduling protocol in dynamic networks and at critical loads (MA, KJ, ALS), pp. 145–154.
IFMIFM-2007-FehnkerHM #modelling #network #protocol #verification
Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks (AF, LvH, AM), pp. 253–272.
IFMIFM-2007-OostdijkRTVW #encryption #learning #protocol #testing #verification
Integrating Verification, Testing, and Learning for Cryptographic Protocols (MO, VR, JT, RGdV, TACW), pp. 538–557.
SEFMSEFM-2007-AichernigPWW #consistency #formal method #industrial #protocol #testing
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
SEFMSEFM-2007-GrandyBSR #encoding #named #protocol #security
ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
SEFMSEFM-2007-Hameurlain #behaviour #component #flexibility #protocol #specification
Flexible Behavioural Compatibility and Substitutability for Component Protocols: A Formal Specification (NH), pp. 391–400.
SEFMSEFM-2007-SahaRC #modelling #protocol #using #verification
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
LISPILC-2007-CottonB #protocol
A metaobject protocol for CLforJava (JC, JB), p. 9.
HCIHCI-AS-2007-YiJ #analysis #approach #online #protocol
The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
HCIOCSC-2007-MaAL #authentication #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
CAiSECAiSE-2007-HamadiPB #concept #modelling #privacy #protocol #web #web service
Conceptual Modeling of Privacy-Aware Web Service Protocols (RH, HYP, BB), pp. 233–248.
SEKESEKE-2007-XuXW #automation #code generation #protocol #state machine #uml
Automated Test Code Generation from UML Protocol State Machines (DX, WX, WEW), pp. 99–104.
QAPLQAPL-2007-Smith #communication #modelling #probability #protocol #source code
Stochastic Modelling of Communication Protocols from Source Code (MJAS), pp. 129–145.
SACSAC-2007-Armendariz-InigoJMDM #bound #database #flexibility #protocol #replication
k-bound GSI: a flexible database replication protocol (JEAI, JRJR, JRGdM, HD, FDME), pp. 556–560.
SACSAC-2007-FuL #effectiveness #protocol
An effective kNN search protocol in wireless broadcast environments (SYF, CML), pp. 925–929.
SACSAC-2007-JunJ #ad hoc #automation #mobile #network #protocol
Automated routing protocol selection in mobile ad hoc networks (TJ, CJ), pp. 906–913.
SACSAC-2007-KanzakiHN #ad hoc #mobile #network #performance #protocol
An efficient TDMA slot assignment protocol in mobile ad hoc networks (AK, TH, SN), pp. 891–895.
SACSAC-2007-KarmakarG #adaptation #distributed #protocol
Adaptive broadcast by distributed protocol switching (SK, AG), pp. 588–589.
SACSAC-2007-Kofron #behaviour #component #protocol #using
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SACSAC-2007-Li #abstraction #parametricity #protocol #proving #verification
Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols (YL), pp. 1534–1535.
SACSAC-2007-LongoG #protocol
A protocol to preserve a code of conduct (CL, PG), pp. 1579–1585.
SACSAC-2007-WuIOKM #adaptation #peer-to-peer #protocol #random
An adaptive randomized search protocol in peer-to-peer systems (YW, TI, FO, HK, TM), pp. 533–537.
SACSAC-2007-YanWZ #ad hoc #mobile #network #protocol
Dual agreement virtual subnet protocol for mobile ad-hoc networks (KQY, SCW, GYZ), pp. 953–954.
ESEC-FSEESEC-FSE-2007-Hanna #implementation #lightweight #named #network #protocol #security #verification
SLEDE: lightweight verification of sensor network security protocol implementations (YH), pp. 591–594.
ICSEICSE-2007-RamanathanGJ #precedence #protocol
Path-Sensitive Inference of Function Precedence Protocols (MKR, AG, SJ), pp. 240–250.
ICSEICSE-2007-SkogsrudBCT #protocol #security
Managing Impacts of Security Protocol Changes in Service-Oriented Applications (HS, BB, FC, FT), pp. 468–477.
HPCAHPCA-2007-ChengCD #adaptation #protocol
An Adaptive Cache Coherence Protocol Optimized for Producer-Consumer Sharing (LC, JBC, DD), pp. 328–339.
HPCAHPCA-2007-PascualGAD #architecture #fault tolerance #protocol
A Low Overhead Fault Tolerant Coherence Protocol for CMP Architectures (RFP, JMG, MEA, JD), pp. 157–168.
LICSLICS-2007-KahlerKT #encryption #infinity #model checking #protocol
Infinite State AMC-Model Checking for Cryptographic Protocols (DK, RK, TT), pp. 181–192.
FATESTestCom-FATES-2007-GrepetM #ad hoc #protocol #self
Nodes Self-similarity to Test Wireless Ad Hoc Routing Protocols (CG, SM), pp. 123–137.
FATESTestCom-FATES-2007-LuukkalaO #embedded #modelling #protocol #testing
Model Based Testing of an Embedded Session and Transport Protocol (VL, IO), pp. 212–227.
DACDAC-2006-GoraiBBTM #protocol #verification
Directed-simulation assisted formal verification of serial protocol and bridge (SG, SB, LB, PT, RSM), pp. 731–736.
DATEDATE-2006-FeyGD #verification
Avoiding false negatives in formal verification for protocol-driven blocks (GF, DG, RD), pp. 1225–1226.
DATEDATE-2006-Shrikumar #protocol
40Gbps de-layered silicon protocol engine for TCP record (HS), pp. 188–193.
DATEDATE-DF-2006-ZarriCDMPRT #on the #protocol #verification
On the verification of automotive protocols (GZ, FC, FD, RM, MP, GR, CT), pp. 195–200.
VLDBVLDB-2006-HausteinHL #contest #protocol #xml
Contest of XML Lock Protocols (MPH, TH, KL), pp. 1069–1080.
ITiCSEITiCSE-2006-DairaineEJCTL #named #network #protocol
IREEL: remote experimentation with real protocols and applications over emulated network (LD, EE, GJ, PC, FT, EL), p. 314.
FoSSaCSFoSSaCS-2006-ZuninoD #analysis #protocol
Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
TACASTACAS-2006-BrownP #protocol #verification
Easy Parameterized Verification of Biphase Mark and 8N1 Protocols (GMB, LP), pp. 58–72.
STOCSTOC-2006-Antonakopoulos #bound #performance #protocol
Fast leader-election protocols with bounded cheaters’ edge (SA), pp. 187–196.
STOCSTOC-2006-KushilevitzLR #composition #protocol #security
Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
ICALPICALP-v2-2006-BalabanPZ #distributed #protocol #safety
Invisible Safety of Distributed Protocols (IB, AP, LDZ), pp. 528–539.
ICALPICALP-v2-2006-DelauneLLT #analysis #morphism #protocol
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
ICALPICALP-v2-2006-FurukawaKI #compilation #performance
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge (JF, KK, HI), pp. 46–57.
ICALPICALP-v2-2006-KahlerKW #protocol
A Dolev-Yao-Based Definition of Abuse-Free Protocols (DK, RK, TW), pp. 95–106.
FMFM-2006-LangariT #communication #formal method #graph transformation #modelling #protocol
Formal Modeling of Communication Protocols by Graph Transformation (ZL, RJT), pp. 348–363.
FMFM-2006-Pavlovic #development #protocol
Connector-Based Software Development: Deriving Secure Protocols (DP), pp. 598–599.
FMFM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving #using
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
SEFMSEFM-2006-NguyenS #aspect-oriented #protocol
VPA-Based Aspects: Better Support for AOP over Protocols (DHN, MS), pp. 167–176.
SEFMSEFM-2006-RamsokulS #framework #modelling #named #protocol #verification #web service
ASEHA: A Framework for Modelling and Verification ofWeb Services Protocols (PR, AS), pp. 196–205.
AdaEuropeAdaEurope-2006-UruenaZBPP #communication #distributed #protocol #realtime
The Arbitrated Real-Time Protocol (AR-TP): A Ravenscar Compliant Communication Protocol for High-Integrity Distributed Systems (SU, JZ, DB, JAP, JAdlP), pp. 215–226.
ICEISICEIS-SAIC-2006-BrzezinskiKK #mobile #protocol #safety
Safety of Checkpointing and Rollback-Recovery Protocol for Mobile Systems with RYW Session Guarantee (JB, AK, JK), pp. 118–123.
ICPRICPR-v3-2006-Haralick06a #protocol #testing
Testing The Torah Code Hypothesis: The Experimental Protocol (RMH), pp. 110–115.
SEKESEKE-2006-UbayashiTSMM #aspect-oriented #collaboration #metamodelling #modelling #protocol
Aspect-Oriented and Collaborative Systems Metamodel Access Protocols for Extensible Aspect-Oriented Modeling (NU, TT, SS, YM, SM), pp. 4–10.
SEKESEKE-2006-ZhangYLC #formal method #game studies #novel #protocol
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization (LZ, JY, ML, JC), pp. 410–415.
QAPLQAPL-2006-AdaoMRV #analysis #protocol #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
QAPLQAPL-2006-ZhangH #analysis #formal method #protocol #streaming
Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
SACSAC-2006-AsplundN #consistency #maintenance #protocol
Post-partition reconciliation protocols for maintaining consistency (MA, SNT), pp. 710–717.
SACSAC-2006-Gutierrez-NolascoVT #interactive #protocol #semantics
A semantic model for safe protocol interaction (SGN, NV, CLT), pp. 1599–1600.
SACSAC-2006-HeatherS #analysis #infinity #protocol #security
To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
SACSAC-2006-Lo #protocol #smt
Data sharing protocols for SMT processors (SWL), pp. 891–895.
SACSAC-2006-PhanTB #benchmark #metric #mobile #performance #protocol
A benchmark on soap’s transport protocols performance for mobile applications (TKAP, ZT, PB), pp. 1139–1144.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set #using
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-RuttiWS #abstraction #implementation #interface #protocol
Service interface: a new abstraction for implementing and composing protocols (OR, PTW, AS), pp. 691–696.
OSDIOSDI-2006-CowlingMLRS #fault tolerance #hybrid #protocol #replication
HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance (JAC, DSM, BL, RR, LS), pp. 177–190.
PPoPPPPoPP-2006-SurJCP #design #protocol
RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits (SS, HWJ, LC, DKP), pp. 32–39.
LICSLICS-2006-Gordon #implementation #protocol #security
Provable Implementations of Security Protocols (ADG), pp. 345–346.
RTARTA-2006-Turuani #protocol
The CL-Atse Protocol Analyser (MT), pp. 277–286.
ICTSSTestCom-2006-ShuL #monitoring #protocol #security #testing
Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
ICTSSTestCom-2006-SubramaniamP #protocol #testing
Analyzing the Impact of Protocol Changes on Tests (MS, ZP), pp. 197–212.
CBSECBSE-2005-LiuG #performance #predict #protocol #using
Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
WICSAWICSA-2005-TivoliG #adaptation #architecture #component #synthesis
Adaptor Synthesis for Protocol-Enhanced Component Based Architectures (MT, DG), pp. 276–277.
ASEASE-2005-CouchotGK #approach #deduction #protocol #safety
A uniform deductive approach for parameterized protocol safety (JFC, AG, NK), pp. 364–367.
DATEDATE-2005-GhoshG #distributed #locality #named #network #protocol #scheduling
LORD: A Localized, Reactive and Distributed Protocol for Node Scheduling in Wireless Sensor Networks (AG, TG), pp. 190–195.
DATEDATE-2005-VerleMAMA #optimisation #power management #protocol
Low Power Oriented CMOS Circuit Optimization Protocol (AV, XM, NA, PM, DA), pp. 640–645.
ITiCSEITiCSE-2005-CrescenziGI #ide #network #protocol #visualisation
NetPrIDE an integrated environment for developing and visualizing computer network protocols (PC, GG, GI), pp. 306–310.
WRLAWRLA-2004-CirsteaMR05 #java #programming #protocol #rule-based #verification
Rule-based Programming in Java For Protocol Verification (HC, PEM, AR), pp. 209–227.
WRLAWRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-CortierW #automation #protocol #proving #security
Computationally Sound, Automated Proofs for Security Protocols (VC, BW), pp. 157–171.
ESOPESOP-2005-KremerR #analysis #protocol #π-calculus
Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
ICSMEICSM-2005-Jurjens #comprehension #implementation #security
Understanding Security Goals Provided by Crypto-Protocol Implementations (JJ), pp. 643–646.
STOCSTOC-2005-KalaiLP #composition #concurrent #protocol
Concurrent general composition of secure protocols in the timing model (YTK, YL, MP), pp. 644–653.
STOCSTOC-2005-LepinksiMS #protocol
Collusion-free protocols (ML, SM, AS), pp. 543–552.
STOCSTOC-2005-PassR #encryption #protocol
New and improved constructions of non-malleable cryptographic protocols (RP, AR), pp. 533–542.
ICALPICALP-2005-DattaDMST #logic #polynomial #probability #protocol #security #semantics
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (AD, AD, JCM, VS, MT), pp. 16–29.
ICALPICALP-2005-MoranN #encryption #protocol
Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
FMFM-2005-LeiI #approach #communication #protocol
An Approach to Unfolding Asynchronous Communication Protocols (YL, SPI), pp. 334–349.
IFMIFM-2005-KristensenWN #ad hoc #mobile #modelling #network #protocol #prototype
Model-Based Prototyping of an Interoperability Protocol for Mobile Ad-Hoc Networks (LMK, MW, PCN), pp. 266–286.
SEFMSEFM-2005-Hameurlain #behaviour #component #on the #protocol
On Compatibility and Behavioural Substitutability of Component Protocols (NH), pp. 394–403.
SEFMSEFM-2005-SubramaniamS #protocol #using
Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
AdaEuropeAdaEurope-2005-MartinezH #communication #named #protocol #realtime #standard
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet (JMM, MGH), pp. 180–195.
ICEISICEIS-v4-2005-SannaVPM #communication #lightweight #mobile #protocol
Lightweight Client-Pull Protocol for Mobile Communication (SS, EDV, AP, CM), pp. 227–231.
ICEISICEIS-v4-2005-TawbiBC #communication #development #framework #protocol #web
A Framework for Web Applications Development: A SOAP Based Communication Protocol (ST, JPB, BC), pp. 82–89.
SEKESEKE-2005-Shen #interactive #protocol
The Service Interaction Protocol for the Chronobot/Virtual Classroom (CVC) System (MS), pp. 16–18.
QAPLQAPL-2004-AldiniP05 #analysis #on the #probability #protocol
On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
QAPLQAPL-2004-BodeiCDBNNP05 #evaluation #performance #protocol #security
Performance Evaluation of Security Protocols Specified in LySa (CB, MC, PD, MB, FN, HRN, CP), pp. 167–189.
QAPLQAPL-2004-LanotteMT05 #analysis #automation #protocol
Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
LOPSTRLOPSTR-2005-PettorossiPS #array #protocol #using #verification
Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
PPDPPPDP-2005-CortierRZ #encryption #protocol #verification
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
PPDPPPDP-2005-Mitchell #analysis #logic #network #protocol #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
SACSAC-2005-BarrettEKMS #ad hoc #multi #network #probability #protocol
Probabilistic multi-path vs. deterministic single-path protocols for dynamic ad-hoc network scenarios (CLB, SE, LK, MVM, JPS), pp. 1166–1173.
SACSAC-2005-ByunS #communication #development #protocol
A pattern-based development methodology for communication protocols (YB, BAS), pp. 1524–1528.
SACSAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #protocol #realtime #set #validation
An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
SACSAC-2005-KanzakiHN #ad hoc #adaptation #network #protocol
An adaptive TDMA slot assignment protocol in ad hoc sensor networks (AK, TH, SN), pp. 1160–1165.
SACSAC-2005-SerranoO #framework #interactive #protocol #recursion #semantics #specification
A semantic framework for the recursive specification of interaction protocols (JMS, SO), pp. 451–456.
SACSAC-2005-Strangio #performance #protocol
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
ICSEICSE-2005-BeekMLGFS #automation #case study #protocol #verification
A case study on the automated verification of groupware protocols (MHtB, MM, DL, SG, AF, MS), pp. 596–603.
HPDCHPDC-2005-KarmonLS #distributed #named #performance #protocol
GWiQ-P: an efficient decentralized grid-wide quota enforcement protocol (KK, LL, AS), pp. 222–232.
CADECADE-2005-Truderung #protocol
Regular Protocols and Attacks with Regular Knowledge (TT), pp. 377–391.
CAVCAV-2005-0002G #modelling #probability #protocol #verification
Improved Probabilistic Models for 802.11 Protocol Verification (AR, KG), pp. 239–252.
CAVCAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
ICLPICLP-2005-Chesani #formal method #interactive #protocol #verification
Formalization and Verification of Interaction Protocols (FC), pp. 437–438.
ICLPICLP-2005-CorinSE #analysis #constraints #protocol #security
PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
LICSLICS-2005-BlanchetAF #automation #protocol #security #verification
Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
ICTSSTestCom-2005-MillerCLH #network #nondeterminism #protocol #testing
Coping with Nondeterminism in Network Protocol Testing (REM, DC, DL, RH), pp. 129–145.
VMCAIVMCAI-2005-Goubault-LarrecqP #analysis #c #encryption #protocol
Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
WICSAWICSA-2004-MichielsDJV #architecture #protocol #self
The DiPS+ Software Architecture for Self-healing Protocol Stacks (SM, LD, WJ, PV), pp. 233–242.
DATEDATE-v1-2004-DSilvaRS #architecture #automaton #communication #framework #modelling #protocol #verification
Synchronous Protocol Automata: A Framework for Modelling and Verification of SoC Communication Architectures (VD, SR, AS), pp. 390–395.
DATEDATE-v2-2004-CasuM #implementation #latency #protocol
Issues in Implementing Latency Insensitive Protocols (MRC, LM), pp. 1390–1391.
DATEDATE-v2-2004-LaouamriA #network #protocol #testing #using
Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
ESOPESOP-2004-BugliesiFM #analysis #authentication #composition #protocol
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
ESOPESOP-2004-Shmatikov #analysis #composition #decidability #encryption #protocol
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
FoSSaCSFoSSaCS-2004-BozgaEL #effectiveness #encryption #on the #protocol
On the Existence of an Effective and Complete Inference System for Cryptographic Protocols (LB, CE, YL), pp. 42–57.
FoSSaCSFoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #protocol #security
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
TACASTACAS-2004-BeauquierCP #automation #first-order #logic #parametricity #protocol #state machine #verification
Automatic Parametric Verification of a Root Contention Protocol Based on Abstract State Machines and First Order Timed Logic (DB, TC, EP), pp. 372–387.
TACASTACAS-2004-DelzannoG #automation #encryption #protocol #verification
Automatic Verification of Time Sensitive Cryptographic Protocols (GD, PG), pp. 342–356.
PEPMPEPM-2004-PopeeaC #correctness #protocol #proving #type system #verification
A type system for resource protocol verification and its correctness proof (CP, WNC), pp. 135–146.
ICALPICALP-2004-AbadiC #equation #protocol #security
Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
ICALPICALP-2004-AwerbuchS #distributed #protocol
Group Spreading: A Protocol for Provably Secure Distributed Name Service (BA, CS), pp. 183–195.
CSCWCSCW-2004-MorrisRSFV #coordination #multi #policy #protocol #social
Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
CSCWCSCW-2004-YangL #adaptation #collaboration #consistency #protocol
Separating data and control: support for adaptable consistency protocols in collaborative systems (YY, DL), pp. 11–20.
ICEISICEIS-v1-2004-Irun-BrizMB #database #distributed #lazy evaluation #protocol #replication
The Abortion Rate of Lazy Replication Protocols for Distributed Databases (LIB, FDME, JMBA), pp. 130–135.
ICEISICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #protocol #using
Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
SEKESEKE-2004-ChenS #interactive #protocol #specification #verification
Specification and Verification of Agent Interaction Protocols (BC, SS), pp. 300–305.
SACSAC-2004-Al-HoumailyC #commit #named #protocol
1-2PC: the one-two phase atomic commit protocol (YJAH, PKC), pp. 684–691.
SACSAC-2004-AlbertiDTGLM #interactive #protocol #specification #verification
Specification and verification of agent interaction protocols in a logic-based system (MA, DD, PT, MG, EL, PM), pp. 72–78.
SACSAC-2004-AwanY #commit #modelling #protocol #reliability #web
Analytical modelling of priority commit protocol for reliable Web applications (IA, MY), pp. 313–317.
SACSAC-2004-DiazCRP #automation #protocol #verification
Automatic verification of the TLS handshake protocol (GD, FC, VVR, FLP), pp. 789–794.
SACSAC-2004-FoulirasXTM #lightweight #multi #named #performance #protocol #video
LEMP: Lightweight Efficient Multicast Protocol for video on demand (PEF, SX, NT, AM), pp. 1226–1231.
SACSAC-2004-ParkerC #policy #protocol
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
SACSAC-2004-XueguangH #contract #protocol
Further extensions of FIPA Contract Net Protocol: threshold plus DoA (XC, HS), pp. 45–51.
FSEFSE-2004-WalkerV #declarative #implementation #protocol
Implementing protocols via declarative event patterns (RJW, KV), pp. 159–169.
ICSEICSE-2004-RyanW #evolution #protocol #using
Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
HPDCHPDC-2004-WuC #evaluation #protocol
Evaluation of Rate-Based Transport Protocols for λ-Grids (X(W, AAC), pp. 87–96.
FATESFATES-2004-ArtsCS #development #erlang #fault tolerance #protocol
Semi-formal Development of a Fault-Tolerant Leader Election Protocol in Erlang (TA, KC, HS), pp. 140–154.
IJCARIJCAR-2004-SteelBM #induction #protocol
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
LICSLICS-2004-AbramskyC #category theory #protocol #quantum #semantics
A Categorical Semantics of Quantum Protocols (SA, BC), pp. 415–425.
ICTSSTestCom-2004-CavalliMZCMCML #multi #validation
A Multi-service and Multi-protocol Validation Platform-Experimentation Results (ARC, AM, FZ, PC, WM, RC, MM, PL), pp. 17–32.
ICTSSTestCom-2004-Schulz #consistency #protocol #testing
Derivation of Abstract Protocol Type Definitions for the Conformance Testing of Text-Based Protocols (SS), pp. 177–192.
VMCAIVMCAI-2004-Guttman #protocol #security #trust
Security, Protocols, and Trust (JDG), p. 1.
DATEDATE-2003-BertozziRBR #embedded #energy #optimisation #performance #protocol
Transport Protocol Optimization for Energy Efficient Wireless Embedded Systems (DB, AR, LB, SR), pp. 10706–10713.
DATEDATE-2003-LiliusTV #architecture #evaluation #performance #protocol
Fast Evaluation of Protocol Processor Architectures for IPv6 Routing (JL, DT, SV), pp. 20158–20163.
DATEDATE-2003-LykakisMVNPSKPR #performance #protocol
Efficient Field Processing Cores in an Innovative Protocol Processor System-on-Chip (GL, NM, KV, NAN, SP, GS, GEK, DNP, DIR), pp. 20014–20019.
DATEDATE-2003-RoychoudhuryMK #debugging #protocol #using
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
DATEDATE-2003-VanzagoBCL #configuration management #design #framework #protocol
Design Space Exploration for a Wireless Protocol on a Reconfigurable Platform (LV, BB, JC, LL), pp. 10662–10667.
DocEngDocEng-2003-BrunDFLP #authoring #concurrent #documentation #protocol #semantics
Semantically-based text authoring and the concurrent documentation of experimental protocols (CB, MD, EF, SL, SP), pp. 193–202.
VLDBVLDB-2003-LuoNEW #protocol
Locking Protocols for Materialized Aggregate Join Views (GL, JFN, CJE, MW), pp. 596–607.
ITiCSEITiCSE-2003-Turau #hypermedia #named #protocol
HTTPExplorer: exploring the hypertext transfer protocol (VT), pp. 198–201.
ESOPESOP-2003-GiambiagiD #implementation #on the #protocol #security
On the Secure Implementation of Security Protocols (PG, MD), pp. 144–158.
ESOPESOP-2003-GorrieriLM #analysis #encryption #protocol #realtime
A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
ESOPESOP-2003-Meadows #analysis #encryption #evolution #protocol #requirements #specification #what
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
FoSSaCSFoSSaCS-2003-BlanchetP #encryption #protocol #termination #verification
Verification of Cryptographic Protocols: Tagging Enforces Termination (BB, AP), pp. 136–152.
FoSSaCSFoSSaCS-2003-FokkinkP #protocol #revisited #verification
Cones and Foci for Protocol Verification Revisited (WF, JP), pp. 267–281.
TACASTACAS-2003-BDSV #analysis #encryption #information management #protocol #representation
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
TACASTACAS-2003-BozgaLP #abstraction #protocol #verification
Pattern-Based Abstraction for Verifying Secrecy in Protocols (LB, YL, MP), pp. 299–314.
TACASTACAS-2003-ChkliaevHV #protocol #verification
Verification and Improvement of the Sliding Window Protocol (DC, JH, EPdV), pp. 113–127.
TACASTACAS-2003-EmersonK #agile #model checking #protocol
Rapid Parameterized Model Checking of Snoopy Cache Coherence Protocols (EAE, VK), pp. 144–159.
TACASTACAS-2003-EsparzaM #multi #protocol
Simple Representative Instantiations for Multicast Protocols (JE, MM), pp. 128–143.
SASSAS-2003-AbadiB #email #protocol #verification
Computer-Assisted Verification of a Protocol for Certified Email (MA, BB), pp. 316–335.
CIAACIAA-2003-FuBS #protocol #specification #verification
Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services (XF, TB, JS), pp. 188–200.
FMFME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-BoyerS #constraints #protocol #synthesis #verification
Synthesis and Verification of Constraints in the PGM Protocol (MB, MS), pp. 264–281.
FMFME-2003-Rusu #composition #protocol #verification
Compositional Verification of an ATM Protocol (VR), pp. 223–243.
EDOCEDOC-2003-HansonM #contract #protocol
Conversation-oriented Protocols for Contract Negotiations (JEH, ZM), pp. 40–49.
ICEISICEIS-v2-2003-DoderoDA #collaboration #design #evaluation #protocol
Evaluation of an Agent-Mediated Collaborative Production Protocol in an Instructional Design Scenario (JMD, PD, IA), pp. 52–57.
ICEISICEIS-v2-2003-SmirnovPLC #constraints #contract #protocol
Constraint-Based Contract Net Protocol (AVS, MP, TL, NC), pp. 549–556.
ICEISICEIS-v4-2003-LingL #approach #composition #interactive #multi #petri net #protocol
Engineering Multiagent Systems Based on Interaction Protocols: A Compositional Petri Net Approach (SL, SWL), pp. 42–48.
PPDPPPDP-2003-Blanchet #approach #automation #encryption #logic programming #protocol #verification
Automatic verification of cryptographic protocols: a logic programming approach (BB), pp. 1–3.
SACSAC-2003-Bella #protocol
Availability of Protocol Goals (GB), pp. 312–317.
SACSAC-2003-DattaS #energy #network #protocol
A Simple and Energy-Efficient Routing Protocol for Radio Networks (AD, SS), pp. 1014–1018.
SACSAC-2003-FrancescoP #authentication #mobile #protocol #reliability
Authenticity in a Reliable Protocol for Mobile Computing (NDF, MP), pp. 318–324.
SACSAC-2003-GuH #internet #protocol #ubiquitous #web
Extended Internet Caching Protocol: A Foundation for Building Ubiquitous Web Caching (WG, AH), pp. 901–907.
SACSAC-2003-PenaCA #approach #protocol #top-down
A Top Down Approach for MAS Protocol Descriptions (JP, RC, JLA), pp. 45–49.
SACSAC-2003-TariMM #protocol #web #web service #xml
An XML-based Conversational Protocol for Web Services (ZT, MM, MM), pp. 1179–1184.
SACSAC-2003-XiaH #configuration management #database #design #mobile #protocol
A Dynamic Data/Currency Protocol for Mobile Database Design and Reconfiguration (YX, AH), pp. 550–556.
SOSPSOSP-2003-PatelWWLS #mobile #protocol #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
CAVCAV-2003-BozgaLP #automation #named #protocol #security #verification
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
LICSLICS-2003-ChevalierKRT #protocol
An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
LICSLICS-2003-EmersonK #model checking #protocol
Model Checking Guarded Protocols (EAE, VK), pp. 361–370.
RTARTA-2003-Comon-LundhC #decidability #encryption #first-order #logic #protocol
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols (HCL, VC), pp. 148–164.
RTARTA-2003-KapurNW #algorithm #composition #protocol
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
ICSTSAT-2003-ArmandoC #analysis #protocol #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
ICTSSTestCom-2003-RanganathanDM #protocol #testing #using #xml
Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
ICTSSTestCom-2003-WuLY #modelling #protocol #testing #towards
Towards Modeling and Testing of IP Routing Protocols (JW, ZL, XY), pp. 49–62.
VMCAIVMCAI-2003-OgataF #protocol #verification
Formal Verification of the Horn-Preneel Micropayment Protocol (KO, KF), pp. 238–252.
WICSAWICSA-2002-ShiH #architecture #communication #modelling #protocol #using
Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
DACDAC-2002-ChiasseriniNS #communication #energy #protocol
Energy-efficient communication protocols (CFC, PN, VS), pp. 824–829.
DACDAC-2002-SiegmundM #communication #declarative #hardware #novel #protocol #specification #synthesis
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications (RS, DM), pp. 602–607.
VLDBVLDB-2002-BlottK #database #execution #in memory #protocol #transaction
An Almost-Serial Protocol for Transaction Execution in Main-Memory Database Systems (SB, HFK), pp. 706–717.
WRLAWRLA-2002-DenkerM #communication #modelling #multi #protocol #term rewriting #using
Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
WRLAWRLA-2002-OgataF #authentication #protocol #verification
Rewriting-Based Verification of Authentication Protocols (KO, KF), pp. 208–222.
WRLAWRLA-2002-Rodriguez #maude #protocol
A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
SASSAS-2002-Blanchet #authentication #protocol #security
From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
SASSAS-2002-CorinE #constraints #protocol #security #verification
An Improved Constraint-Based System for the Verification of Security Protocols (RC, SE), pp. 326–341.
ICALPICALP-2002-KhannaNR #communication #protocol
Control Message Aggregation in Group Communication Protocols (SK, JN, DR), pp. 135–146.
CAiSECAiSE-2002-BenerecettiPST #model checking #multi #protocol #verification
Verification of Payment Protocols via MultiAgent Model Checking (MB, MP, LS, ST), pp. 311–327.
CAiSECAiSE-2002-IvanDP #approach #complexity #design #middleware #protocol #using
Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
ICEISICEIS-2002-PantiSTV #automation #protocol #security #verification
Automatic Verification of Security in Payment Protocols for Electronic Commerce (MP, LS, ST, SV), pp. 968–974.
ICEISICEIS-2002-SadegSA #distributed #named #protocol #realtime #transaction
D-ANTICIP: A Protocol Suitable for Distributed Real-Time Transactions (BS, SSB, LA), pp. 171–178.
GPCEGPCE-2002-BarbeauB #development #generative #programming #protocol #stack #using
A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
PPDPPPDP-2002-BozzanoD #automation #linear #logic #protocol #verification
Automated protocol verification in linear logic (MB, GD), pp. 38–49.
POPLPOPL-2002-AbadiB #logic programming #protocol #security #source code
Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
SACSAC-2002-BorealeB #analysis #automation #protocol #security
Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
SACSAC-2002-BurnsideCMMDR #mobile #protocol #security
Proxy-based security protocols in networked mobile devices (MB, DEC, TM, AM, SD, RLR), pp. 265–272.
CAVCAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAVCAV-2002-BozzanoD #algorithm #protocol #verification
Algorithmic Verification of Invalidation-Based Protocols (MB, GD), pp. 295–308.
CAVCAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #protocol #refinement #verification
Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
CAVCAV-2002-ChevalierV #automation #bound #protocol #security #verification
Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
RTARTA-2002-Mitchell #analysis #multi #protocol #security
Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
ICTSSTestCom-2002-Ahtiainen #formal method #mobile #protocol #testing
Applying Formal Method in Mobile Protocol Testing (AA), p. 187–?.
ICTSSTestCom-2002-Horvath #ad hoc #automation #generative #modelling #protocol #testing #validation
Ad-hoc Protocol Modelling, Validation and Automated Test Suite Generation (EH), p. 235–?.
ICTSSTestCom-2002-Kone #protocol
Compliance of Wireless Application Protocols (OK), pp. 129–138.
ICTSSTestCom-2002-SeolKC #communication #generative #multi #principle #protocol #testing
Interoperability Test Generation for Communication Protocols based on Multiple Stimuli Principle (SS, MK, STC), pp. 151–168.
VMCAIVMCAI-2002-BaukusLS #liveness #protocol #safety #verification
Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness (KB, YL, KS), pp. 317–330.
VMCAIVMCAI-2002-Shyamasundar #encryption #framework #protocol
Analyzing Cryptographic Protocols in a Reactive Framework (RKS), pp. 46–64.
WICSAWICSA-2001-GeppertR #design #internet #protocol
Collaboration-Based Design — Exemplified by the Internet Session Initiation Protocol (SIP) (BG, FR), p. 158–?.
ASEASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
ASEASE-2001-JurjensW #protocol #testing
Formally Testing Fail-Safety of Electronic Purse Protocols (JJ, GW), pp. 408–411.
DACDAC-2001-ChelceaN #interface #protocol #robust
Robust Interfaces for Mixed-Timing Systems with Application to Latency-Insensitive Protocols (TC, SMN), pp. 21–26.
PODSPODS-2001-Schuldt #execution #order #process #protocol #transaction
Process Locking: A Protocol based on Ordered Shared Locks for the Execution of Transactional Processes (HS).
ESOPESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #protocol #security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
FASEFASE-2001-OlveczkyKMTZ #analysis #maude #network #protocol #realtime #specification
Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
PLDIPLDI-2001-DeLineF #bytecode #low level #protocol
Enforcing High-Level Protocols in Low-Level Software (RD, MF), pp. 59–69.
SASSAS-2001-Blanchet #encryption #prolog #protocol
Abstracting Cryptographic Protocols by Prolog Rules (BB), pp. 433–436.
SASSAS-2001-GordonJ #analysis #protocol #security
A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
STOCSTOC-2001-Ambainis #bound #protocol #quantum
A new protocol and lower bounds for quantum coin flipping (AA), pp. 134–142.
STOCSTOC-2001-KempeKD #protocol
Spatial gossip and resource location protocols (DK, JMK, AJD), pp. 163–172.
STOCSTOC-2001-NaorN #communication #evaluation #protocol
Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
FLOPSFLOPS-2001-Delzanno #case study #debugging #prolog #protocol #security #specification
Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λ Prolog — A Case-study (GD), pp. 123–137.
ICALPICALP-2001-Boreale #analysis #encryption #protocol
Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
ICALPICALP-2001-ComonCM #automaton #constraints #memory management #protocol #set
Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols (HC, VC, JM), pp. 682–693.
ICALPICALP-2001-MuschollP #communication #finite #protocol #sequence chart
From Finite State Communication Protocols to High-Level Message Sequence Charts (AM, DP), pp. 720–731.
FMFME-2001-IglesiasGCNF #case study #protocol #prototype #specification
From Complex Specifications to a Working Prototype. A Protocol Engineering Case Study (MJFI, FJGC, JMPC, MLN, ARF), pp. 436–448.
FMFME-2001-StoySA #correctness #protocol #proving
Proofs of Correctness of Cache-Coherence Protocols (JES, XS, A), pp. 43–71.
CHICHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
VISSOFTSVIS-2001-CrescenziI #network #protocol #taxonomy #tool support #towards #visualisation
Towards a Taxonomy of Network Protocol Visualization Tools (PC, GI), pp. 241–255.
LOPSTRLOPSTR-2001-DelzannoE #debugging #logic programming #protocol #proving #security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols (GD, SE), pp. 76–90.
PADLPADL-2001-BellaB #analysis #constraints #protocol #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
PADLPADL-2001-Cirstea #authentication #protocol #specification #using
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
SACSAC-2001-NakanoHSN #effectiveness #hypermedia #protocol #streaming #web
Extending hypertext streaming protocol to realize effective web page transmission via a chaching proxy (TN, KH, SS, SN), pp. 440–445.
CAVCAV-2001-AlurW #implementation #network #protocol #refinement #verification
Verifying Network Protocol Implementations by Symbolic Refinement Checking (RA, BYW), pp. 169–181.
CAVCAV-2001-KwiatkowskaNS #automation #distributed #protocol #random #using #verification
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
CAVCAV-2001-RoychoudhuryR #automation #induction #protocol #verification
Automated Inductive Verification of Parameterized Protocols (AR, IVR), pp. 25–37.
CAVCAV-2001-SongPP #automation #generative #implementation #named #protocol #security #verification
AGVI — Automatic Generation, Verification, and Implementation of Security Protocols (DXS, AP, DP), pp. 241–245.
LICSLICS-2001-MitchellRST #analysis #calculus #probability #process #protocol #security
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
LICSLICS-2001-Stoller #bound #protocol
A Bound on Attacks on Payment Protocols (SDS), pp. 61–70.
DACDAC-2000-EisnerSHNNV #design #hardware #protocol
A methodology for formal design of hardware control with application to cache coherence protocols (CE, IS, RH, WGN, KLN, KV), pp. 724–729.
DACDAC-2000-KatagiriYKHT #communication #concurrent #hardware #implementation #multi #protocol
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization (HK, KY, AK, TH, KT), pp. 762–767.
DATEDATE-2000-MurookaM #protocol
Protocol Stack-Based Telecom-Emulator (TM, TM), pp. 186–191.
ITiCSEITiCSE-2000-Stratton #approach #education #network #protocol #quote
“Network protocols and services”: a non-specialist approach to teaching networking (poster session) (DS), p. 194.
TACASTACAS-2000-BenerecettiG #logic #model checking #protocol #security #using
Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
TACASTACAS-2000-ClarkeJM #partial order #protocol #reduction #security #verification
Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
WRLAWRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
WRLAWRLA-2000-MasonT #maude #network #protocol #simulation
Simple Network Protocol Simulation within Maude (IAM, CLT), pp. 274–291.
WRLAWRLA-2000-Millen #analysis #bibliography #encryption #protocol #term rewriting
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
WRLAWRLA-2000-Rodriguez #analysis #case study #maude #protocol #specification
Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
WRLAWRLA-2000-VerdejoPM #maude #protocol
The Leader Election Protocol of IEEE 1394 in Maude (AV, IP, NMO), pp. 383–404.
STOCSTOC-2000-Klauck #communication #on the #probability #protocol #quantum
On quantum and probabilistic communication: Las Vegas and one-way protocols (HK), pp. 644–651.
ICALPICALP-2000-FocardiGM #analysis #encryption #protocol
Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
ICALPICALP-2000-GoldbergJKP #bound #capacity #protocol
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols (LAG, MJ, SK, MP), pp. 705–716.
WLCWLC-2000-YamamuraK #protocol
Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
EDOCEDOC-2000-QuEM #framework #implementation #protocol
Implementation of an Enterprise-Level Groupware System Based on J2EE Platform and WebDAV Protocol (CQ, TE, CM), pp. 160–169.
ICEISICEIS-2000-HeL #protocol #towards
Towards a Secure and Complete Protocol for Electronic Commerce (RH, KL), pp. 435–441.
TOOLSTOOLS-ASIA-2000-MingliangYBL #distributed #multi #protocol
Protocol Mapping Model for Distributed Multimedia Systems (WM, QY, MB, XL), pp. 114–121.
TOOLSTOOLS-EUROPE-2000-CanalFTV #calculus #corba #interface #protocol
Extending CORBA Interfaces with p-Calculus for Protocol Compatibility (CC, LF, JMT, AV), pp. 208–225.
TOOLSTOOLS-EUROPE-2000-ParssinenKHOT #case study #experience #protocol #uml
UML for Protocol Engineering — Extensions and Experiences (JP, NvK, JH, TO, MT), pp. 82–93.
TOOLSTOOLS-USA-2000-SinghW #composition #design #distributed #object-oriented #protocol
Modular Object-Oriented Design of Distributed Protocols (GS, JW), pp. 329–338.
LOPSTRLOPSTR-2000-PoernomoC #protocol #proving #source code
Protocols between programs and proofs (IP, JNC).
LOPSTRLOPSTR-J-2000-PoernomoC #protocol #proving #source code
Protocols between Programs and Proofs (IP, JNC), pp. 18–37.
SACSAC-2000-Lyon #assurance #protocol #web
Assurance Protocols and Small Web Retailers (GEL), pp. 904–908.
SACSAC-2000-YeoYP #consistency #distributed #memory management #protocol
An Asynchronous Protocol for Release Consistent Distributed Shared Memory Systems (JHY, HYY, TP), pp. 716–721.
FSEFSE-2000-ButkevichRBY #compilation #debugging #protocol #tool support
Compiler and tool support for debugging object protocols (SB, MR, GB, MY), pp. 50–59.
ASPLOSASPLOS-2000-ChouCEH #compilation #protocol #using
Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
CADECADE-2000-GenetK #encryption #protocol #verification
Rewriting for Cryptographic Protocol Verification (TG, FK), pp. 271–290.
CAVCAV-2000-Cohen #encryption #first-order #named #protocol #verification
TAPS: A First-Order Verifier for Cryptographic Protocols (EC), pp. 568–571.
CAVCAV-2000-Delzanno #automation #protocol #verification
Automatic Verification of Parameterized Cache Coherence Protocols (GD), pp. 53–68.
CAVCAV-2000-Meadows #analysis #encryption #formal method #protocol
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
ICLPCL-2000-DutraCB #logic programming #parallel #protocol
The Impact of Cache Coherence Protocols on Parallel Logic Programming Systems (IdCD, VSC, RB), pp. 1285–1299.
ICTSSTestCom-2000-BousquetRSVBV #automation #protocol #testing
Formal Test Automation: The Conference Protocol with TGV/TORX (LdB, SR, SS, CV, AB, RGdV), pp. 221–228.
ICTSSTestCom-2000-HeerinkFT #automation #protocol #testing
Formal Test Automation: The Conference Protocol with PHACT (LH, JF, JT), pp. 211–220.
ICTSSTestCom-2000-KhoumsiADEG #approach #protocol #realtime #testing
An Approach for Testing Real Time Protocol Entities (AK, MA, RD, AEN, LG), pp. 281–300.
ASEASE-1999-BesseCL #automation #generative #protocol #testing
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol (CB, ARC, DL), pp. 73–80.
ASEASE-1999-Brackin #analysis #automation #effectiveness #encryption #implementation #protocol
Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
DACDAC-1999-HaynalB #component #scheduling
A Model for Scheduling Protocol-Constrained Components and Environments (SH, FB), pp. 292–295.
DATEDATE-1999-ONilsJ #implementation #independence #operating system #protocol #specification #synthesis
Operating System Sensitive Device Driver Synthesis from Implementation Independent Protocol Specification (MO, AJ), pp. 562–567.
SIGMODSIGMOD-1999-BreitbartKRSS #database #protocol
Update Propagation Protocols For Replicated Databases (YB, RK, RR, SS, AS), pp. 97–108.
FoSSaCSFoSSaCS-1999-Abadi #protocol #security #specification
Security Protocols and Specifications (MA), pp. 1–13.
TACASTACAS-1999-AbdullaAB #bound #protocol #verification
Symbolic Verification of Lossy Channel Systems: Application to the Bounded Retransmission Protocol (PAA, AA, AB), pp. 208–222.
TACASTACAS-1999-DongDRRRSSSW #case study #comparative #concurrent #tool support #verification
Fighting Livelock in the i-Protocol: A Comparative Study of Verification Tools (YD, XD, YSR, CRR, IVR, SAS, OS, EWS, DSW), pp. 74–88.
TACASTACAS-1999-KahloucheVZ #communication #consistency #hardware #protocol #testing #using
Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
TACASTACAS-1999-MarchignoliM #analysis #automation #composition #encryption #protocol #verification
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
SASSAS-1999-Monniaux #automaton #encryption #protocol
Abstracting Cryptographic Protocols with Tree Automata (DM), pp. 149–163.
STOCSTOC-1999-ScheidelerV #performance #protocol
From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols (CS, BV), pp. 215–224.
ICALPICALP-1999-ComptonD #encryption #protocol #proving
Proof Techniques for Cryptographic Protocols (KJC, SD), pp. 25–39.
FMFM-v1-1999-TabourierCI #empirical #protocol #testing #using
A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
FMFM-v1-1999-ZhouC #analysis #communication #formal method #protocol
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
FMFM-v2-1999-CimattiPSTV #communication #protocol #specification #validation
Formal Specification and Validation of a Vital Communication Protocol (AC, PLP, RS, PT, AV), pp. 1584–1604.
IFMIFM-1999-Grosse-Rhode #algebra #comparison #composition #protocol #specification
A Compositional Comparison of Specifications of the Alternating Bit Protocol in CCS and UNITY Based on Algebra Transformation Systems (MGR), pp. 253–272.
HCIHCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
AdaEuropeAdaEurope-1999-RealW #multi #protocol #realtime
The Ceiling Protocol in Multi-moded Real-Time Systems (JR, AJW), pp. 275–286.
CAiSECAiSE-1999-MelloulBSW #composition #protocol
CPAM, A Protocol for Software Composition (LM, DB, NS, GW), pp. 11–25.
EDOCEDOC-1999-OrvalhoFB #corba #multi #protocol #reliability
Evaluating light-weight reliable multicast protocol extensions to the CORBA event service (JO, LF, FB), pp. 255–261.
ICEISICEIS-1999-JungBP #agile #framework #implementation #network #protocol #prototype
Implementing Network Protocols in Java-A Framework for Rapid Prototyping (MJ, EB, AP), pp. 649–656.
ICEISICEIS-1999-JunHSKP #network #performance #protocol
An Efficient Protocol for Radio Packet Networks (ARJ, SJH, HSS, GHK, MSP), pp. 642–648.
TOOLSTOOLS-USA-1999-PlasilBV #behaviour #bound #component #protocol
Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
SACSAC-1999-BakC #protocol #random
Randomized Distance-Vector Routing Protocol (SB, JAC), pp. 78–84.
HPCAHPCA-1999-CoxLHZ #comparison #consistency #lazy evaluation #memory management #performance #protocol
A Performance Comparison of Homeless and Home-Based Lazy Release Consistency Protocols in Software Shared Memory (ALC, EdL, YCH, WZ), pp. 279–283.
HPCAHPCA-1999-FalsafiW #abstraction #communication #parallel #programming #protocol #queue
Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols (BF, DAW), pp. 182–192.
LCTESLCTES-1999-LeeJS #database #protocol #realtime
A Secure Dynamic Copy Protocol in Real-Time Secure Database Systems (SL, BSJ, HS), pp. 73–79.
CADECADE-1999-Weidenbach #analysis #automation #first-order #logic #protocol #security #towards
Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
CAVCAV-1999-BerardF #automation #consistency #parametricity #protocol #realtime #verification
Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol (BB, LF), pp. 96–107.
CAVCAV-1999-CarloniMS #latency #protocol
Latency Insensitive Protocols (LPC, KLM, ALSV), pp. 123–133.
CAVCAV-1999-Schumann #analysis #authentication #automation #named #protocol
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
CSLCSL-1999-DelzannoEP #analysis #constraints #protocol
Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
ICTSSIWTCS-1999-Cavalli #protocol #testing
Different Approaches to Protocol and Service Testing (ARC), pp. 3–18.
ICTSSIWTCS-1999-HeT #hardware #testing
Protocol-Inspired Hardware Testing (JH, KJT), pp. 131–148.
ICTSSIWTCS-1999-KangSKHYKSYK #consistency #development #protocol
Development and Application of ATM Protocol Conformance Test System (SK, YS, DK, MH, JY, IK, JS, SY, MK), pp. 331–346.
ICTSSIWTCS-1999-LatvakoskiH #communication #embedded #protocol #simulation #testing
Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems (JL, HH), pp. 379–394.
LICSLICS-1999-EsparzaFM #on the #protocol #verification
On the Verification of Broadcast Protocols (JE, AF, RM), pp. 352–359.
LICSLICS-1999-Paulson #protocol #proving #security
Proving Security Protocols Correct (LCP), pp. 370–381.
DACDAC-1998-HoltmannB #compilation #design #protocol #using
Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
DACDAC-1998-PasseroneRS #automation #interface #protocol #synthesis
Automatic Synthesis of Interfaces Between Incompatible Protocols (RP, JAR, ALSV), pp. 8–13.
DATEDATE-1998-ObergHK #communication #grammarware #hardware #protocol #scheduling #synthesis
Scheduling of Outputs in Grammar-based Hardware Synthesis of Data Communication Protocols (, AH, AK), pp. 596–603.
ESOPESOP-1998-AbadiG #bisimulation #encryption #protocol
A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
WRLAWRLA-1998-StegglesK #case study #logic #protocol #semantics
A timed rewriting logic semantics for SDL: A case study of alternating bit protocol (LJS, PK), pp. 83–104.
STOCSTOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
STOCSTOC-1998-ColeMHMRSSV #multi #network #protocol #random
Randomized Protocols for Low Congestion Circuit Routing in Multistage Interconnection Networks (RC, BMM, FMadH, MM, AWR, KS, RKS, BV), pp. 378–388.
ICALPICALP-1998-MukundKRS #finite #protocol #robust
Robust Asynchronous Protocols Are Finite-State (MM, KNK, JR, MAS), pp. 188–199.
FMFM-1998-FujitaRH #case study #experience #parallel #protocol #verification
Two Real Formal Verification Experiences: ATM Switch Chip and Parallel Cache Protocol (MF, SPR, AJH), pp. 281–295.
TOOLSTOOLS-USA-1998-ChoMK #approach #protocol #specification
A Protocol Based Approach to Specifying Interoperability between Objects (IHC, JDM, LK), pp. 84–96.
HPCAHPCA-1998-SamantaBIS #clustering #design #performance #protocol
Home-Based SVM Protocols for SMP Clusters: Design and Performance (RS, AB, LI, JPS), pp. 113–124.
HPDCHPDC-1998-CzechHG #composition #flexibility #kernel #protocol
Flexible Protocol Stacks by In-Kernel Composition (CBC, BH, MG), pp. 344–345.
HPDCHPDC-1998-OguchiSTK #clustering #data mining #effectiveness #evaluation #mining #optimisation #parallel #parametricity #protocol #scalability
Optimizing Protocol Parameters to Large Scale PC Cluster and Evaluation of its Effectiveness with Parallel Data Mining (MO, TS, TT, MK), pp. 34–41.
HPDCHPDC-1998-PagniaT #protocol #replication
Improving Replication Protocols through Priorities (HP, OET), pp. 342–343.
LCTESLCTES-1998-GeorgeM #multi #protocol #reliability
A Uniform Reliable Multicast Protocol with Guaranteed Response Times (LG, PM), pp. 65–82.
CAVCAV-1998-Bolignano #encryption #model checking #protocol #verification
Integrating Proof-Based and Model-Checking Techniques for the Formal Verification of Cryptographic Protocols (DB), pp. 77–87.
CAVCAV-1998-EmersonN #protocol #verification
Verification of Parameterized Bus Arbitration Protocol (EAE, KSN), pp. 452–463.
CAVCAV-1998-FeltyHS #protocol #verification
Protocol Verification in Nuprl (APF, DJH, FAS), pp. 428–439.
CAVCAV-1998-Mitchell #analysis #finite #protocol #security
Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
ICTSSIWTCS-1998-BourhfirDAR #consistency #generative #incremental #protocol #testing
A Guided Incremental Test Case Generation Procedure for Conformance Testing for CEFSM Specified Protocols (CB, RD, EMA, NR), pp. 275–290.
ICTSSIWTCS-1998-Gecse #consistency #hypermedia #internet #protocol #testing
Conformance Testing Methodology of Internet Protocols Internet Application-Layer Protocol Testing — the Hypertext Transfer Protocol (RG), pp. 35–48.
ICTSSIWTCS-1998-KahloucheVZ #automation #empirical #execution #generative #industrial #protocol #testing
An Industrial Experiment in Automatic Generation of Executable Test Suites for a Cache Coherency Protocol (HK, CV, MZ), pp. 211–226.
ICTSSIWTCS-1998-OgishiIKS #exception #protocol
Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
ICTSSIWTCS-1998-ShinK #protocol #testing
Interoperability Test Suite Derivation for the ATM/B-ISDN Signaling Protocol (JS, SK), pp. 307–326.
TACASTACAS-1997-DArgenioKRT #bound #exclamation #protocol
The Bounded Retransmission Protocol Must Be on Time! (PRD, JPK, TCR, JT), pp. 416–431.
PEPMPEPM-1997-MullerVM #optimisation #partial evaluation #protocol #scalability
Scaling up Partial Evaluation for Optimizing the Sun Commercial RPC Protocol (GM, ENV, RM), pp. 116–126.
STOCSTOC-1997-KargerLLPLL #consistency #distributed #protocol #random #web
Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web (DRK, EL, FTL, RP, MSL, DL), pp. 654–663.
FMFME-1997-AyadiB #empirical #encryption #protocol #verification
Verification of Cryptographic Protocols: An Experiment (MMA, DB), pp. 358–377.
FMFME-1997-Gregoire #protocol #proving #using
TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
FMFME-1997-MokkedemFJ #protocol #specification #verification
A TLA Solution to the Specification and Verification of the RLP1 Retransmission Protocol (AM, MJF, RdBJ), pp. 398–417.
TOOLSTOOLS-ASIA-1997-YanW #design #object-oriented #protocol
An Object-Oriented Model for Protocol Design (SBY, FJW), pp. 12–21.
TOOLSTOOLS-USA-1997-SeinturierDF #distributed #object-oriented #protocol
A Meta-Object Protocol for Distributed OO Applications (LS, LD, GF), pp. 306–317.
SACSAC-1997-Al-HoumailyCL #commit #performance #protocol
Enhancing the performance of presumed commit protocol (YJAH, PKC, SPL), pp. 131–133.
SACSAC-1997-GhoshGP #network #protocol
Fault-containing network protocols (SG, AG, SVP), pp. 431–437.
SACSAC-1997-KhasawnehO #evaluation #network #protocol
An evaluation study of protocols used in cable TV networks (RMK, MSO), pp. 52–57.
SACSAC-1997-LuL #protocol
A negotiation protocol for batch task assignments in dynamic load distribution (CL, SML), pp. 447–453.
SACSAC-1997-MostafaS #collaboration #multi #protocol #reliability
A reliable multicast session protocol for collaborative continuous-feed applications (WM, MS), pp. 35–39.
SACSAC-1997-PisanelliC #process
Support to the management of clinical activities in the context of protocol-based care (DMP, FC), pp. 15–19.
HPCAHPCA-1997-AmzaCDZ #adaptation #multi #protocol
Software DSM Protocols that Adapt between Single Writer and Multiple Writer (CA, ALC, SD, WZ), pp. 261–271.
HPDCHPDC-1997-FriedmanR #performance #protocol
Packing Messages as a Tool for Boosting the Performance of Total Ordering Protocols (RF, RvR), pp. 233–242.
HPDCHPDC-1997-HaydenR #communication #optimisation #protocol
Optimizing Layered Communication Protocols (MH, RvR), pp. 169–177.
PPoPPPPoPP-1997-BianchiniCK #interactive #parallel #programming #protocol
The Interaction of Parallel Programming Constructs and Coherence Protocols (RB, EVC, LIK), pp. 69–79.
PPoPPPPoPP-1997-RaghavachariR #named #protocol
Ace: Linguistic Mechanisms for Customizable Protocols (MR, AR), pp. 80–89.
CADECADE-1997-Schumann #automation #encryption #protocol #verification
Automatic Verification of Cryptographic Protocols with SETHEO (JS), pp. 87–100.
ITiCSEITiCSE-1996-GrundkeZ #protocol #visualisation
Simulator for visualizing data link layer protocols (EWG, ZZ), p. 235.
TACASTACAS-1996-Lowe #protocol #using
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
PLDIPLDI-1996-ChandraRL #memory management #named #protocol
Teapot: Language Support for Writing Memory Coherence Protocols (SC, BR, JRL), pp. 237–248.
FMFME-1996-BoigelotG #analysis #model checking #protocol #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
FMFME-1996-HavelundS #model checking #protocol #proving #theorem proving #verification
Experiments in Theorem Proving and Model Checking for Protocol Verification (KH, NS), pp. 662–681.
CSCWCSCW-1996-KatzenbergPM #evolution #protocol
Computer Support for Clinical Practice: Embedding and Evolving Protocols of Care (BK, FP, JPM), pp. 364–369.
CSCWCSCW-1996-PalfreymanR #protocol #web
A Protocol for User Awareness on the World Wide Web (KP, TR), pp. 130–139.
AdaTRI-Ada-1996-YueDL #ada #protocol
Priority Ceiling Protocol in Ada (KbY, SD, TL), pp. 3–9.
SEKESEKE-1996-SlivaMS #communication #protocol
A Method for Applying G-Nets To Communication Protocols (VPS, TM, SMS), pp. 145–152.
ECOOPECOOP-1996-GarbinatoFG #design #distributed #protocol #reliability
Protocol Classes for Designing Reliable Distributed Environments (BG, PF, RG), pp. 316–343.
SACSAC-1996-Al-HoumailyC #commit #multi #protocol
Dealing with incompatible presumptions of commit protocols in multidatabase systems (YJAH, PKC), pp. 186–195.
SACSAC-1996-KhalilSO #network #protocol #simulation
A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks (KMK, YSS, MSO), pp. 77–81.
SACSAC-1996-MengelA #network #protocol #tutorial
A network protocol analyzer with tutorial (SM, SA), pp. 115–119.
SACSAC-1996-Nanavati #protocol #self
A simple self-stabilizing reset protocol (AAN), pp. 93–97.
FSEFSE-1996-NaumovichCO #analysis #communication #data flow #protocol #using #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
HPCAHPCA-1996-AndersonK #adaptation #hybrid #protocol
Two Adaptive Hybrid Cache Coherency Protocols (CA, ARK), pp. 303–313.
HPCAHPCA-1996-RaynaudZT #adaptation #multi #protocol #scalability
Distance-Adaptive Update Protocols for Scalable Shared-Memory Multiprocessors (AR, ZZ, JT), pp. 323–334.
HPCAHPCA-1996-ReisnerW #parallel #protocol
A Cache Coherency Protocol for Optically Connected Parallel Computer Systems (JAR, TSW), pp. 222–231.
HPCAHPCA-1996-TakahashiTKS #multi #protocol
A Shared-Bus Control Mechanism and a Cache Coherence Protocol for a High-Performance On-Chip Multiprocessor (MT, HT, EK, SS), pp. 314–322.
HPDCHPDC-1996-BraunCDGG #automation #compilation #distributed #implementation #protocol
ALFred, a Protocol Compiler for the Automated Implementation of Distributed Applications (TB, IC, CD, FG, LG), pp. 450–459.
CAVCAV-1996-BengtssonGKLLPY #protocol #using #verification
Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
CAVCAV-1996-BoigelotG #communication #infinity #protocol #using #verification
Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (Extended Abstract) (BB, PG), pp. 1–12.
CAVCAV-1996-FernandezGKMMS #named #protocol #validation #verification
CADP — A Protocol Validation and Verification Toolbox (JCF, HG, AK, LM, RM, MS), pp. 437–440.
CAVCAV-1996-MerinoT #analysis #communication #integration #named #protocol #verification
EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
CAVCAV-1996-ParkD #distributed #protocol #transaction #verification
Protocol Verification by Aggregation of Distributed Transactions (SP, DLD), pp. 300–310.
ISSTAISSTA-1996-BarjaktarovicCJ #functional #kernel #protocol #specification #using #verification
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
ISSTAISSTA-1996-CallahanM #approach #multi #protocol #reliability #validation #verification
An Approach to Verification and Validation of a Reliable Multicasting Protocol (JRC, TLM), pp. 187–194.
ICLPJICSLP-1996-DeneckerBDPS #calculus #empirical #information management #protocol #representation #specification
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification (MD, KVB, GD, FP, DDS), pp. 170–184.
LICSLICS-1996-GodefroidL #protocol #queue #verification
Symbolic Protocol Verification With Queue BDDs (PG, DEL), pp. 198–206.
DACDAC-1995-NarayanG #generative #interface #process #protocol #using
Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
SIGMODSIGMOD-1995-MoleskyR #database #memory management #protocol
Recovery Protocols for Shared Memory Database Systems (LDM, KR), pp. 11–22.
STOCSTOC-1995-Yao #metric #protocol #quantum #security
Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
SEKESEKE-1995-Lin #protocol #verification
Formal Verification of the File Transfer Protocol (FL), pp. 117–122.
SEKESEKE-1995-LinL #message passing #model checking #protocol #verification
Formal Verification of a Message-Passing Protocol with Model Checking (AL, FL), pp. 296–302.
ECOOPECOOP-1995-Florijn #functional #parsing #protocol
Object Protocols as Functional Parsers (GF), pp. 351–373.
ECOOPECOOP-1995-LeaM #interface #protocol #specification #using
Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
ECOOPECOOP-1995-StroudW #data type #protocol #using
Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
OOPSLAOOPSLA-1995-Chiba #c++ #protocol
A Metaobject Protocol for C++ (SC), pp. 285–299.
OOPSLAOOPSLA-1995-HuniJE #framework #network #protocol
A Framework for Network Protocol Software (HH, REJ, RE), pp. 358–369.
HPDCHPDC-1995-Sivalingam #hybrid #network #protocol
Hybrid Media Access Protocols for a DSM System Based on Optical WDM Networks (KMS), pp. 40–47.
HPDCHPDC-1995-TachikawaT #communication #multi #protocol
Multimedia Intra-Group Communication Protocol (TT, MT), pp. 180–187.
SOSPSOSP-1995-GopalakrishnanP #protocol #realtime
A Real-time Upcall Facility for Protocol Processing with QoS Guarantees (RG, GMP), p. 231.
CAVCAV-1995-HoW #analysis #automation #protocol
Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
DACDAC-1994-NarayanG #communication #generative #protocol
Protocol Generation for Communication Channels (SN, DG), pp. 547–551.
PODSPODS-1994-AlonsoAA #constraints #protocol
Reducing Recovery Constraints on Locking based Protocols (GA, DA, AEA), pp. 129–138.
STOCSTOC-1994-FeigeK #fault #protocol #proving
Two prover protocols: low error at affordable rates (UF, JK), pp. 172–183.
STOCSTOC-1994-MacKenziePR #on the #probability #protocol
On contention resolution protocols and associated probabilistic phenomena (PDM, CGP, RR), pp. 153–162.
ICALPICALP-1994-BlundoSV #distributed #protocol
Randomness in Distributed Protocols (CB, ADS, UV), pp. 568–579.
LISPLFP-1994-BiagioniHLM #ml #network #protocol #stack #standard
Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
CSCWCSCW-1994-FurutaS #collaboration #protocol #prototype
Interpreted Collaboration Protocols and Their Use in Groupware Prototyping (RF, PDS), pp. 121–131.
SEKESEKE-1994-DuranteSV #protocol #specification
A LOTOS specification of the SERCOS field-bus protocol (LD, RS, AV), pp. 139–147.
OOPSLAOOPSLA-1994-YellinS #adaptation #automation #interface #protocol
Interfaces, Protocols, and the Semi-Automatic Construction of Software Adaptors (DMY, RES), pp. 176–190.
ASPLOSASPLOS-1994-SkeppstedtS #algorithm #compilation #protocol
Simple Compiler Algorithms to Reduce Ownership Operhead in Cache Coherence Protocols (JS, PS), pp. 286–296.
HPDCHPDC-1994-BurrellMP #analysis #capacity #implementation #multi #network #performance #protocol
Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
HPDCHPDC-1994-MoralesA #design #implementation #logic #protocol
Design of a Header Processor for the PSi Implementation of the Logical Link Control Protocol in LANs (FAM, HAA), pp. 270–277.
HPDCHPDC-1994-TakamuraT #communication #performance #protocol #scalability
Large-Scale Group Communication Protocol on High-Speed Channel (MT, MT), pp. 254–261.
CAVCAV-1994-MihailP #on the #protocol #random #testing
On the Random Walk Method for Protocol Testing (MM, CHP), pp. 132–141.
CAVCAV-1994-NaikS #model checking #modelling #protocol #using #verification
Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
ISSTAISSTA-1994-BochmannP #bibliography #protocol #testing
Protocol Testing: Review of Methods and Relevance for Software Testing (GvB, AP), pp. 109–124.
STOCSTOC-1993-CooperL #linear #performance #protocol
Fast perfection-information leader-election protocol with linear immunity (JC, NL), pp. 662–671.
FMFME-1993-WidyaH #protocol #specification #towards
Towards an Implementation-oriented Specification of TP Protocol in LOTOS (IW, GJvdH), pp. 93–109.
HCIHCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
AdaEuropeAdaEurope-1993-BjornfotALW #ada #distributed #protocol #runtime
Distributed Run-Time Systems, a Protocol for Ada (LB, LA, KL, GW), pp. 249–263.
TOOLSTOOLS-EUROPE-1993-LakosK #modelling #protocol
Modeling a Door Controller Protocol in LOOPN (CAL, CK), pp. 31–43.
HPDCHPDC-1993-DobosiewiczG #named #network #protocol
DSMA: A Fair Capacity-1 Protocol for Gigabit Ring Networks (WD, PG), pp. 92–100.
HPDCHPDC-1993-MullinTDS #communication #formal method #protocol #scheduling
Formal Method for Scheduling, Routing and Communication Protocol (LMRM, ST, DRD, EAS), pp. 234–242.
HPDCHPDC-1993-NakamuraT #network #performance #protocol
Starvation-Prevented Priority-Based Total Ordering Broadcast Protocol on High-Speed Single Channel Network (AN, MT), pp. 281–288.
SOSPSOSP-1993-MaedaB #composition #network #protocol
Protocol Service Decomposition for High-Performance Networking (CM, BNB), pp. 244–255.
CAVCAV-1993-Varaiya #automation #design #protocol
Protocol Design for an Automated Highway System (Abstract) (PV), p. 180.
ICLPICLP-1993-LadretR #logic programming #protocol #testing
Contribution of Logic Programming to Support Telecommunications Protocol Tests (DL, MR), pp. 845–846.
ICTSSIWPTS-1993-ChansonDKLLVZZZ #protocol #testing
The UBC Protocol Testing Environment (STC, HD, MK, QL, YL, STV, SZ, LZ, JZ), pp. 215–230.
ICTSSIWPTS-1993-GhrigaF #adaptation #communication #nondeterminism #protocol #testing
Adaptive Testing of Non-Deterministic Communication Protocols (MG, PGF), pp. 347–362.
ICTSSIWPTS-1993-HennigerSB #generative #protocol #specification #testing
Test Suite Generation for Application Layer Protocols from Formal Specifications in Estelle (OH, BS, SB), pp. 67–85.
ICTSSIWPTS-1993-KalyanasundaramA #protocol #testing #visualisation
Protocol Test Case Visualization (PK, PDA), pp. 197–214.
ICTSSIWPTS-1993-MottelerCS #fault #protocol #testing
Fault Coverage of UIO-based Methods for Protocol Testing (HEM, AC, DPS), pp. 21–34.
ICTSSIWPTS-1993-PetrenkoDK #evaluation #on the #protocol #testing
On Evaluation of Testability of Protocol Structures (AP, RD, HK), pp. 111–124.
ICTSSIWPTS-1993-PetrenkoYLD #consistency #nondeterminism #protocol #state machine #testing
Nondeterministic State Machines in Protocol Conformance Testing (AP, NY, AL, AD), pp. 363–378.
ICTSSIWPTS-1993-VuongLC #communication #design #framework #protocol #testing
A Framework for the Design for Testability of Communication Protocols (STV, AAFL, STC), pp. 89–108.
PODSPODS-1992-AgrawalAJ #approach #protocol #transaction
An Approach to Eliminate Transaction Blocking in Locking Protocols (DA, AEA, RJ), pp. 223–235.
PODSPODS-1992-RabinovichL #commit #database #fault tolerance #protocol
A Fault-Tolerant Commit Protocol for Replicated Databases (MR, EDL), pp. 139–148.
SIGMODSIGMOD-1992-AgrawalAJ #database #protocol #realtime #using
Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
SIGMODSIGMOD-1992-HarrisRW #concurrent #database #multi #performance #protocol
A High Performance Multiversion Concurrency Control Protocol of Object Databases (CH, MR, CW), p. 320.
SIGMODSIGMOD-1992-JhingranK #analysis #database #protocol #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMODSIGMOD-1992-RabinovichL #fault tolerance #protocol
Improving Fault Tolerance and Supporting Partial Writes in Structured Coterie Protocols for Replicated Objects (MR, EDL), pp. 226–235.
CSEETSEI-1992-Lai #education #protocol
Teaching Protocol Engineering in Honours Year (RL), pp. 143–156.
SEKESEKE-1992-ZhangWG #programming #protocol
An Open System Protocol for Agent-Oriented Programming (WRZ, WW, AG), pp. 616–623.
ECOOPECOOP-1992-GuerraouiCLR #message passing #protocol
Nesting Actions through Asynchronous Message Passing: the ACS Protocol (RG, RC, AL, PR), pp. 170–184.
SOSPSOSP-WIP-1991-KasshoekRST92 #distributed #protocol
FLIP; an Internetwork Protocol for Supporting Distributed Systems (Abstract) (MFK, RvR, HvS, AST), p. 29.
ASPLOSASPLOS-1992-VeenstraF #evaluation #hybrid #performance #protocol
A Performance Evaluation of Optimal Hybrid Cache Coherency Protocols (JEV, RJF), pp. 149–160.
HPDCHPDC-1992-BogineniD #comparison #network #performance #protocol
Performance Comparison of Reservation and Preallocation Protocols for Star-Coupled WDM Photonic Networks (KB, PWD), pp. 94–103.
HPDCHPDC-1992-SchmidtBS #adaptation #architecture #flexibility #lightweight #multi #named #network #performance #protocol
ADAPTIVE: A Flexible and Adaptive Transport System Architecture to Support Lightweight Protocols for Multimedia Applications on High-Speed Networks (DCS, DFB, TS), pp. 174–186.
ICTSSIWPTS-1992-CavalliMK #automation #consistency #formal method #generative #protocol #specification #testing
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications (ARC, PM, SUK), pp. 237–248.
ICTSSIWPTS-1992-ChungS #generative #performance #protocol #testing
Applications of Sufficient Conditions for Efficient Protocol Test Generation (AC, DPS), pp. 219–228.
ICTSSIWPTS-1992-Koster #consistency #problem #protocol #testing
Problems and Difficulties with GSM Protocol Conformance Testing (RK), p. 291.
ICTSSIWPTS-1992-Witteman #consistency #experience #protocol
Promoting the Local Test Method, GSM Protocol Conformance Test Experience (MFW), pp. 292–294.
PODSPODS-1991-JohnsonR #bound #consistency #protocol #replication
A Tight Upper Bound on the Benefits of Replication and Consistency Control Protocols (DBJ, LR), pp. 75–81.
SIGMODSIGMOD-1991-LevyKS #commit #distributed #protocol #transaction
An Optimistic Commit Protocol for Distributed Transaction Management (EL, HFK, AS), pp. 88–97.
VLDBVLDB-1991-MohanN #performance #protocol #transaction
Recovery and Coherency-Control Protocols for Fast Intersystem Page Transfer and Fine-Granularity Locking in a Shared Disks Transaction Environment (CM, IN), pp. 193–207.
CHICHI-1991-RudnickyH #interactive #modelling #protocol #recognition #speech
Models for evaluating interaction protocols in speech recognition (AIR, AGH), pp. 285–291.
ICTSSIWPTS-1991-CavalliK #consistency #generative #graph grammar #protocol #term rewriting #testing #using
Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
ICTSSIWPTS-1991-ChansonL #on the #protocol #testing
On Static and Dynamic Test Case Selections in Protocol Confomance Testing (STC, QL), pp. 255–266.
ICTSSIWPTS-1991-CorbiS #embedded #protocol #testing
Common Abstract Test Suite for the Connection Oriented Presentation Protocol Embedded Under Different Application Contexts (CC, GS), pp. 143–149.
ICTSSIWPTS-1991-Petrenko #protocol
Checking Experiments with Protocol Machines (AP), pp. 83–94.
ICTSSIWPTS-1991-TretmansKB #consistency #formal method #protocol #testing
Protocol Conformance Testing: A Formal Perspective on ISO IS-9646 (JT, PK, EB), pp. 131–142.
ICTSSIWPTS-1991-VuongA #communication #metric #on the #protocol #test coverage
On Test Coverage Metrics for Communication Protocols (STV, JAC), pp. 31–45.
SIGMODSIGMOD-1990-BadrinathR #concurrent #evaluation #multi #performance #protocol #semantics
Performance Evaluation of Semantics-based Multilevel Concurrency Control Protocols (BRB, KR), pp. 163–172.
VLDBVLDB-1990-AgrawalA #approach #performance #protocol
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data (DA, AEA), pp. 243–254.
STOCSTOC-1990-BeaverMR #complexity #protocol
The Round Complexity of Secure Protocols (Extended Abstract) (DB, SM, PR), pp. 503–513.
STOCSTOC-1990-FeigeS #protocol
Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
OOPSLAOOPSLA-ECOOP-1990-Paepcke #named #protocol #testing
PCLOS: Stress Testing CLOS Experiencing the Metaobject Protocol (AP), pp. 194–211.
CAVCAV-1990-LaiPD #on the #protocol #using #verification
On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
CAVCAV-1990-LloretAV #communication #composition #design #petri net #protocol #using #verification
Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
CAVCAV-1990-LoewensteinD #higher-order #logic #multi #protocol #simulation #using #verification
Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
HTHT-1989-Pearl #protocol
Sun’s Link Service: A Protocol for Open Linking (AP), pp. 137–146.
STOCSTOC-1989-BabaiNS #multi #protocol #pseudo #sequence
Multiparty Protocols and Logspace-hard Pseudorandom Sequences (Extended Abstract) (LB, NN, MS), pp. 1–11.
STOCSTOC-1989-RabinB #multi #protocol
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) (TR, MBO), pp. 73–85.
CHICHI-1989-KnoxBL #design #protocol #user interface
Directed dialogue protocols: verbal data for user interface design (STK, WAB, EFL), pp. 283–287.
OOPSLAOOPSLA-1989-BosL #named #parallel #protocol
PROCOL — A Parallel Object Language with Protocols (JvdB, CL), pp. 95–102.
SOSPSOSP-1989-SrinivasanM #protocol
Spritely NFS: Experiments with Cache-Consistency Protocols (VS, JCM), pp. 45–57.
PODSPODS-1988-Kelter #concurrent #protocol #queue
The Queue Protocol: A Deadlock-free Homogeneous Non-Two-Phase Locking Protocol (UK), pp. 142–151.
SIGMODSIGMOD-1988-AbbadiT #concurrent #paradigm #protocol
The Group Paradigm for Concurrency Control Protocols (AEA, ST), pp. 126–134.
STOCSTOC-1988-ChaumCD #multi #protocol
Multiparty Unconditionally Secure Protocols (Extended Abstract) (DC, CC, ID), pp. 11–19.
ICALPICALP-1988-Tel #protocol #verification
Assertional Verification of a Timer Based Protocol (GT), pp. 600–614.
PODSPODS-1987-Hadzilacos #analysis #protocol
A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
STOCSTOC-1987-GoldreichMW #game studies #how #protocol #theorem
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority (OG, SM, AW), pp. 218–229.
STOCSTOC-1987-HastadLR #analysis #multi #protocol
Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) (JH, FTL, BR), pp. 241–253.
ICALPICALP-1987-LarsenM #bisimulation #protocol #using #verification
Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
HCIHCI-CE-1987-LuekePB #analysis #protocol #requirements
User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
LISPLFP-1986-LermenM #distributed #protocol
A Protocol for Distributed Reference Counting (CWL, DM), pp. 343–350.
PODSPODS-1985-AbbadiSC #data transformation #fault tolerance #performance #protocol
An Efficient, Fault-Tolerant Protocol for Replicated Data Management (AEA, DS, FC), pp. 215–229.
PODSPODS-1985-Ramarao #commit #complexity #on the #protocol
On the Complexity of Commit Protocols (KVSR), pp. 235–244.
STOCSTOC-1985-Bracha #protocol #random
An O(lg n) Expected Rounds Randomized Byzantine Generals Protocol (GB), pp. 316–326.
ICALPICALP-1985-Ben-OrGMR #contract #protocol
A Fair Protocol for Signing Contracts (Extended Abstract) (MBO, OG, SM, RLR), pp. 43–52.
PODSPODS-1984-BuckleyS #concurrent #graph #protocol #using
Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
PLDISCC-1984-Farrow #attribute grammar
Sub-protocol-evaluators for attribute grammars (RF), pp. 70–80.
STOCSTOC-1984-Awerbuch #network #performance #protocol
An Efficient Network Synchronization Protocol (BA), pp. 522–525.
STOCSTOC-1984-Willard #protocol
Log-Logarithmic Protocols for Resolving Ethernet and Semaphore Conflicts (Preliminary Report) (DEW), pp. 512–521.
POPLPOPL-1984-ShashaPE #network #protocol #verification
Temporal Verification of Carrier-Sense Local Area Network Protocols (DS, AP, WE), pp. 54–65.
PODSPODS-1983-PetersonS #protocol
LOG Write-Ahead Protocols and IMS/VS Logging (RJP, JPS), pp. 216–243.
SIGMODSIGMOD-1983-WilmsLS #distributed #execution #protocol #quote
“I wish I were over there”: Distributed Execution Protocols for Data Definition in R* (PFW, BGL, PGS), pp. 238–242.
VLDBVLDB-1983-BuckleyS #database #multi #protocol
Obtaining Progressive Protocols for a Simple Multiversion Database Model (GNB, AS), pp. 74–80.
VLDBVLDB-1983-DasguptaK #concurrent #database #protocol
A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases (PD, ZMK), pp. 92–94.
STOCSTOC-1983-ChandraFL83b #multi #protocol
Multi-Party Protocols (AKC, MLF, RJL), pp. 94–99.
PODSPODS-1982-MenasceN #commit #evaluation #performance #protocol
Performance Evaluation of a Two-Phase Commit Based Protocol for DDBS (DAM, TN), pp. 247–255.
PODSPODS-1982-MohanFS #commutative #protocol
Compatibility and Commutativity in Non-two-phase Locking Protocols (CM, DSF, AS), pp. 283–292.
SIGMODSIGMOD-1982-Cooper #analysis #commit #distributed #protocol
Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
VLDBVLDB-1982-KedemMS #concurrent #performance #protocol
An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols (ZMK, CM, AS), pp. 91–97.
STOCSTOC-1982-DeMilloLM #encryption #protocol
Cryptographic Protocols (RAD, NAL, MM), pp. 383–400.
ICSEICSE-1982-ChibaKK #communication #protocol
A Model for Description of Communication Protocol (KC, KK, AK), pp. 424–428.
ICSEICSE-1982-MiyazawaOK #communication #protocol
The Portable Communication Protocol Program COMPAS for Data Terminal Systems (KM, MO, SK), pp. 420–421.
ICSEICSE-1982-ShiratoriGN #communication #design #protocol
A New Design Language for Communication Protocols and a Systematic Design Method of Communication Systems (NS, JG, SN), pp. 403–413.
SIGMODSIGMOD-1981-Skeen #commit #protocol
Nonblocking Commit Protocols (DS), pp. 133–142.
VLDBVLDB-1981-FussellKS #database #formal method #protocol
A Theory of Correct Locking Protocols for Database Systems (DSF, ZMK, AS), pp. 112–124.
ICSEICSE-1981-BaerGGR #modelling #protocol #proving #specification
The Two-Step Commitment Protocol: Modeling, Specification and Proof Methodology (JLB, GG, CG, GR), pp. 363–373.
VLDBVLDB-1980-KedemS #protocol
Non-Two-Phase Locking Protocols with Shared and Exclusive Locks (ZMK, AS), pp. 309–317.
SIGMODSIGMOD-1978-MenascePM #coordination #database #distributed #protocol
A Locking Protocol for Resource Coordination in Distributed Databases (Abstract) (DAM, GJP, RRM), p. 2.
ICSEICSE-1976-GoudaM #analysis #design #modelling #on the #protocol
On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.