Sciweavers

183 search results - page 25 / 37
» A Computational Model of Logic-Based Negotiation
Sort
View
CIMCA
2005
IEEE
15 years 3 months ago
Applying a Web-Service-Based Model to Dynamic Service-Deployment
Owing to the increase in both heterogeneity and complexity in today’s networking systems, the need arises for an architecture for network-based services that provides flexibilit...
Christos Chrysoulas, Evangelos Haleplidis, Robert ...
SAC
2009
ACM
15 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
CSFW
2009
IEEE
15 years 1 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
MIDDLEWARE
2004
Springer
15 years 3 months ago
Mobile adaptive tasks guided by resource contracts
This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about...
Peter Rigole, Yolande Berbers, Tom Holvoet
AI
2004
Springer
15 years 3 months ago
A Principled Modular Approach to Construct Flexible Conversation Protocols
Building conversation protocols has traditionally been an art more than a science, as their construction is often guided by designers’ intuition rather than by a principled appro...
Roberto A. Flores, Robert C. Kremer