Sciweavers

18924 search results - page 3457 / 3785
» Conformance of Distributed Systems
Sort
View
ATAL
2008
Springer
15 years 6 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 6 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CIKM
2008
Springer
15 years 6 months ago
Workload-based optimization of integration processes
The efficient execution of integration processes between distributed, heterogeneous data sources and applications is a challenging research area of data management. These inn proc...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...
CIKM
2008
Springer
15 years 6 months ago
Ranked feature fusion models for ad hoc retrieval
We introduce the Ranked Feature Fusion framework for information retrieval system design. Typical information retrieval formalisms such as the vector space model, the bestmatch mo...
Jeremy Pickens, Gene Golovchinsky
ATAL
2006
Springer
15 years 6 months ago
Evaluating bidding strategies for simultaneous auctions
Bidding for multiple items or bundles on online auctions raises challenging problems. We assume that an agent has a valuation function that returns its valuation for an arbitrary ...
Teddy Candale, Sandip Sen
« Prev « First page 3457 / 3785 Last » Next »