Sciweavers

4209 search results - page 651 / 842
» Abstract Dialectical Frameworks
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 9 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
WLP
2005
Springer
15 years 9 months ago
Expressing Interaction in Combinatorial Auction through Social Integrity Constraints
Abstract. Combinatorial Auctions are an attractive application of intelligent agents; their applications are countless and are shown to provide good revenues. On the other hand, on...
Marco Alberti, Federico Chesani, Alessio Guerri, M...
DCOSS
2005
Springer
15 years 9 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan
EGC
2005
Springer
15 years 9 months ago
The University of Virginia Campus Grid: Integrating Grid Technologies with the Campus Information Infrastructure
Abstract. Grid software often unfortunately requires significant changes in existing infrastructure, both in terms of policy and mechanism, instead of accommodating and leveraging ...
Marty Humphrey, Glenn S. Wasson
APLAS
2004
ACM
15 years 9 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann