Sciweavers

1363 search results - page 212 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
SIGECOM
2003
ACM
97views ECommerce» more  SIGECOM 2003»
15 years 4 months ago
A robust open ascending-price multi-unit auction protocol against false-name bids
This paper presents a new ascending-price multi-unit auction protocol. As far as the authors are aware, this is the first protocol that has an open format, and in which sincere b...
Atsushi Iwasaki, Makoto Yokoo, Kenji Terada
WS
2003
ACM
15 years 4 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
15 years 4 months ago
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We rep...
Ying Xiao, Winfried Just
CF
2010
ACM
15 years 4 months ago
On-chip communication and synchronization mechanisms with cache-integrated network interfaces
Per-core local (scratchpad) memories allow direct inter-core communication, with latency and energy advantages over coherent cache-based communication, especially as CMP architect...
Stamatis G. Kavadias, Manolis Katevenis, Michail Z...
SACMAT
2010
ACM
15 years 3 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam