Sciweavers

598 search results - page 89 / 120
» Aspect-Oriented Development Using Protocol Modeling
Sort
View
ASIAN
2009
Springer
274views Algorithms» more  ASIAN 2009»
15 years 3 months ago
Reducing Equational Theories for the Decision of Static Equivalence
Abstract. Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
PERCOM
2008
ACM
16 years 1 months ago
Multiagent Place-Based Virtual Communities for Pervasive Computing
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
132
Voted
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 7 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ICAIL
2007
ACM
15 years 5 months ago
An implementation of norm-based agent negotiation
In this paper, we develop our previous outline of a multi-agent architecture for regulated information exchange in crime investigations. Interactions about information exchange be...
Pieter Dijkstra, Henry Prakken, Kees de Vey Mestda...
JSA
2006
81views more  JSA 2006»
15 years 1 months ago
Deferred locking with shadow transaction for client-server DBMSs
Data-shipping systems that allow inter-transaction caching raise the need of a transactional cache consistency maintenance (CCM) protocol because each client is able to cache a po...
Hyeokmin Kwon, Songchun Moon