Sciweavers

1180 search results - page 103 / 236
» Interaction Protocols in Agentis
Sort
View
120
Voted
COMCOM
2010
148views more  COMCOM 2010»
14 years 10 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
IEEESCC
2006
IEEE
15 years 6 months ago
Secure and Provable Service Support for Human-Intensive Real-Estate Processes
This paper introduces SOAR, a service-oriented architecture for the real-estate industry that embeds trust and security, allows for formal correctness proofs of service interactio...
Emerson Ribeiro de Mello, Savas Parastatidis, Phil...
116
Voted
WIMOB
2009
IEEE
15 years 7 months ago
Interference across Multi-hop Wireless Chains
—Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher...
Vinay Kolar, Saquib Razak, Nael B. Abu-Ghazaleh, P...
121
Voted
ATAL
2004
Springer
15 years 6 months ago
Towards the Application of Argumentation-Based Dialogues for Education
This paper describes our work constructing a generalized framework for modeling multi agent interactions in education-related applications. Historically, interactive learning syst...
Elizabeth Sklar, Simon Parsons
100
Voted
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin