Sciweavers

1714 search results - page 269 / 343
» Abstract Models of Memory Management
Sort
View
IH
2001
Springer
15 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
MMMACNS
2001
Springer
15 years 2 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner
SIGIR
2000
ACM
15 years 2 months ago
Bridging the lexical chasm: statistical approaches to answer-finding
Abstract This paper investigates whether a machine can automatically learn the task of finding, within a large collection of candidate responses, the answers to questions. The lea...
Adam L. Berger, Rich Caruana, David Cohn, Dayne Fr...
COORDINATION
2000
Springer
15 years 2 months ago
The LuCe Coordination Technology for MAS Design and Development on the Internet
Internet-based multi-agent systems call for new metaphors, abstractions, methodologies and enabling technologies specifically tailored to agent-oriented engineering. While coordin...
Enrico Denti, Andrea Omicini, Vladimiro Toschi
IH
1999
Springer
15 years 2 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson