Sciweavers

1180 search results - page 97 / 236
» Interaction Protocols in Agentis
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 6 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 4 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
118
Voted
MASCOTS
2001
15 years 2 months ago
Improving Ensemble-TCP Performance on Asymmetric Networks
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Qian Wu, Carey L. Williamson
92
Voted
GC
2004
Springer
15 years 4 months ago
The SOCS Computational Logic Approach to the Specification and Verification of Agent Societies
This article summarises part of the work done during the first two years of the SOCS project, with respect to the task of modelling interaction amongst CL-based agents. It describe...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
94
Voted
WSCG
2001
161views more  WSCG 2001»
15 years 2 months ago
An Animation System for User interface Agents
With the advent of software agents and assistants, the concept of so called conversational user interfaces evolved, incorporating natural language interaction, dialogue management...
Marc Alexa, Uwe Berner, Michael Hellenschmidt, Tho...