Sciweavers

2061 search results - page 109 / 413
» Authorization for Metacomputing Applications
Sort
View
ISI
2006
Springer
15 years 4 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
JAPLL
2007
117views more  JAPLL 2007»
15 years 4 months ago
Logic-Based Agent Verification
ecking, algebraic, abstract machines, etc.). THE JOURNAL The Journal of Applied Logic1 publishes papers in areas of logic which can be applied in other disciplines as well as appli...
Michael Fisher, Munindar P. Singh, Diana F. Spears...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
15 years 1 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
FOCM
2010
122views more  FOCM 2010»
15 years 1 months ago
Scattering in Flatland: Efficient Representations via Wave Atoms
This paper presents a numerical compression strategy for the boundary integral equation of acoustic scattering in two dimensions. These equations have oscillatory kernels that we ...
Laurent Demanet, Lexing Ying
PRL
2010
149views more  PRL 2010»
14 years 11 months ago
Adaptive linear models for regression: Improving prediction when population has changed
The general setting of regression analysis is to identify a relationship between a response variable Y and one or several explanatory variables X by using a learning sample. In a ...
Charles Bouveyron, Julien Jacques