Sciweavers

1316 search results - page 13 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 3 months ago
Comparing multicast and newscast communication in evolving agent societies
This paper investigates the effects of two different communication protocols within an artificial society, where communication and cooperation is necessary to survive. Communicat...
A. E. Eiben, Martijn C. Schut, T. Toma
AIIDE
2008
14 years 12 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CCS
2007
ACM
15 years 3 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
ICTAI
2009
IEEE
15 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu