Sciweavers

48 search results - page 7 / 10
» Implementing Social Norms Using Policies
Sort
View
102
Voted
DGO
2009
151views Education» more  DGO 2009»
14 years 11 months ago
Making ecology research results useful for resource management: a case study in visual analytics
This paper addresses challenges to resource managers' use of scientific research, and reports strategies and informatics tools to ameliorate those challenges. Our work involv...
Natalie Kopytko, Judith Bayard Cushing, Lee Zeman,...
74
Voted
ATAL
2007
Springer
15 years 4 months ago
A component-based approach to standardising agent communication
We address the problem of standardising the semantics of agent communication. The diversity of existing approaches suggests that no single agent communication language can satisfa...
Frank Guerin, Wamberto Weber Vasconcelos
93
Voted
WPES
2004
ACM
15 years 3 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
95
Voted
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 21 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
76
Voted
UM
2009
Springer
15 years 4 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...