Sciweavers

1540 search results - page 307 / 308
» Deceptive agents and language
Sort
View
ECOOPW
1999
Springer
13 years 10 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
SIGOPSE
1998
ACM
13 years 10 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
VRML
1995
ACM
13 years 9 months ago
Internetwork Infrastructure Requirements for Virtual Environments
Virtual environments (VEs) are a broad multidisciplinary research area that includes all aspects of computer science, virtual reality, virtual worlds, teleoperation and telepresenc...
Donald P. Brutzman, Michael R. Macedonia, Michael ...
CCE
2007
13 years 7 months ago
Supporting Shared Understanding within Distributed Enterprise Development Teams
: This paper presents a practitioners’ report on supporting shared understanding within distributed development teams. Our software domain focuses on Enterprise development in th...
Jessica Rubart, Stephan Müller
ACL
1998
13 years 7 months ago
A Generative Lexicon Perspective for Adjectival Modification
This paper presents a semantic interpretation of adjectival modification in terms of the Generative Lexicon. It highlights the elements which can be borrowed from the GL and devel...
Patrick Saint-Dizier