Sciweavers

8493 search results - page 1486 / 1699
» Implementing a distributed firewall
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
ATAL
2007
Springer
15 years 10 months ago
The human agent virtual environment
In this paper we describe a multi-agent simulation called the Human Agent Virtual Environment (or HAVE). HAVE is a test bed to explore agent-environment interaction in multiagent ...
Michael Papasimeon, Adrian R. Pearce, Simon Goss
CCS
2007
ACM
15 years 10 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
CIKM
2007
Springer
15 years 10 months ago
Ontology module extraction for ontology reuse: an ontology engineering perspective
Problems resulting from the management of shared, distributed knowledge has led to ontologies being employed as a solution, in order to effectively integrate information across a...
Paul Doran, Valentina A. M. Tamma, Luigi Iannone
148
Voted
CMMR
2007
Springer
174views Music» more  CMMR 2007»
15 years 10 months ago
Between Mapping, Sonification and Composition: Responsive Audio Environments in Live Performance
This paper describes recent work on a large-scale, interactive theater performance entitled Schwelle as a platform to pose critical questions around the conception, design and imp...
Christopher L. Salter, Marije A. J. Baalman, Danie...
« Prev « First page 1486 / 1699 Last » Next »