Sciweavers

4889 search results - page 869 / 978
» A Refactoring Approach to Parallelism
Sort
View
NSPW
2003
ACM
15 years 9 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
NSPW
2003
ACM
15 years 9 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
VRML
2003
ACM
15 years 9 months ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser
163
Voted
AI
2003
Springer
15 years 9 months ago
A Formal Theory for Describing Action Concepts in Terminological Knowledge Bases
This paper introduces a formal theory for describing actions in terminological knowledge bases, closely related to description logics. It deals in particular with the problem of ad...
Christel Kemke
CONCUR
2003
Springer
15 years 9 months ago
Contract Signing, Optimism, and Advantage
Abstract. A contract signing protocol lets two parties exchange digital signatures on a pre-agreed text. Optimistic contract signing protocols enable the signers to do so without i...
Rohit Chadha, John C. Mitchell, Andre Scedrov, Vit...