Sciweavers

5790 search results - page 703 / 1158
» Distributed programming with distributed authorization
Sort
View
124
Voted
HT
2005
ACM
15 years 9 months ago
Evaluation of adaptive hypermedia systems' conversion
Conversion between different adaptive hypermedia systems has barely been proposed, yet alone tested in realistic settings. This paper presents the evaluation of the interoperabili...
Alexandra I. Cristea, Helen Ashman, Craig D. Stewa...
123
Voted
SC
2005
ACM
15 years 9 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
ACISP
2005
Springer
15 years 9 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
115
Voted
ATAL
2005
Springer
15 years 9 months ago
A simulator for multi-agent partnership formation based on dependence graphs
The PartNET++ system is an experimental multi-agent-based simulation tool that uses a new model based on hyper-graphs for understanding partnership formation among heterogeneous a...
Júlio de Lima do Rêgo Monteiro, Jaime...
CONCUR
2005
Springer
15 years 9 months ago
Deriving Weak Bisimulation Congruences from Reduction Systems
The focus of process calculi is interaction rather than computation, and for this very reason: (i) their operational semantics is conveniently expressed by labelled transition syst...
Roberto Bruni, Fabio Gadducci, Ugo Montanari, Pawe...