Sciweavers

4498 search results - page 608 / 900
» How to Invent Functions
Sort
View
KES
2007
Springer
15 years 11 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
LADS
2007
Springer
15 years 11 months ago
A Common Basis for Agent Organisation in BDI Languages
Programming languages based on the BDI style of agent model are now common. Within these there appears to be some, limited, agreement on the core functionality of agents. However, ...
Anthony Hepple, Louise A. Dennis, Michael Fisher
MIDDLEWARE
2007
Springer
15 years 11 months ago
R-OSGi: Distributed Applications Through Software Modularization
In this paper we take advantage of the concepts developed for centralized module management, such as dynamic loading and unloading of modules, and show how they can be used to supp...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 11 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 11 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase