Sciweavers

4190 search results - page 546 / 838
» Implementing commitment-based interactions
Sort
View
PRICAI
2000
Springer
15 years 7 months ago
Virtual Enterprise Design - BDI Agents vs. Objects
Current research identifying architectures for a virtual enterprise has moved from information modelling to role modelling. Thus, a high level of autonomy results from the distribu...
Iyad Rahwan, Ryszard Kowalczyk, Yun Yang
CCS
2008
ACM
15 years 5 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
CEC
2008
IEEE
15 years 5 months ago
Towards the evolution of an artificial homeostatic system
Abstract-- This paper presents an artificial homeostatic system (AHS) devoted to the autonomous navigation of mobile robots, with emphasis on neuro-endocrine interactions. The AHS ...
Renan C. Moioli, Patrícia Amâncio Var...
CONCUR
2008
Springer
15 years 5 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
ECOOP
2008
Springer
15 years 5 months ago
Bristlecone: A Language for Robust Software Systems
We present Bristlecone, a programming language for robust software systems. Bristlecone applications have two components: a high-level organization description that specifies how t...
Brian Demsky, Alokika Dash