Sciweavers

7504 search results - page 312 / 1501
» Computing with Action Potentials
Sort
View
POLICY
2005
Springer
15 years 9 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
AP2PC
2004
Springer
15 years 9 months ago
On Exploiting Agent Technology in the Design of Peer-to-Peer Applications
Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of ap...
Steven Willmott, Josep M. Pujol, Ulises Cort&eacut...
ASM
2004
ASM
15 years 9 months ago
The Cryptographic Abstract Machine
tographic Abstract Machine Dean Rosenzweig and Davor Runje University of Zagreb The Cryptographic Abstract Machine is an executional model of cryptographic actions, independent of ...
Dean Rosenzweig, Davor Runje
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 9 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
INLG
2004
Springer
15 years 9 months ago
Context-Based Incremental Generation for Dialogue
This paper describes an implemented model of context-based incremental tactical generation within the Dynamic Syntax framework [1] which directly reflects dialogue phenomena such ...
Matthew Purver, Ruth Kempson