Sciweavers

2061 search results - page 140 / 413
» Authorization for Metacomputing Applications
Sort
View
WWW
2003
ACM
16 years 5 months ago
Evolving the Semantic Web with Mangrove
Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 10 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ECOOP
2005
Springer
15 years 10 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
ATAL
2006
Springer
15 years 8 months ago
Reinforcement learning for declarative optimization-based drama management
A long-standing challenge in interactive entertainment is the creation of story-based games with dynamically responsive story-lines. Such games are populated by multiple objects a...
Mark J. Nelson, David L. Roberts, Charles Lee Isbe...
KRDB
1994
78views Database» more  KRDB 1994»
15 years 5 months ago
The Problems of Data Modeling in Software Practice
This paper presents, fromthe author's perspective, the problems that occur in practice during data modelling. The author's experiences are a result of a considerable num...
Harald Huber