Sciweavers

21324 search results - page 4047 / 4265
» Making the case for computing
Sort
View
WPES
2003
ACM
15 years 8 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
WPES
2003
ACM
15 years 8 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
WPES
2003
ACM
15 years 8 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ATAL
2003
Springer
15 years 8 months ago
A multi-agent system for the quantitative simulation of biological networks
We apply the multi-agent system (MAS) platform to the task of biological network simulation. In this paper, we describe the simulation of signal transduction (ST) networks using t...
Salim Khan, Ravi Makkena, Foster McGeary, Keith S....
ATAL
2003
Springer
15 years 8 months ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella
« Prev « First page 4047 / 4265 Last » Next »