Sciweavers

2979 search results - page 276 / 596
» Modelling secure multiagent systems
Sort
View
ICICS
2010
Springer
15 years 2 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
WSC
2007
15 years 7 months ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
141
Voted
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 5 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
ATAL
2008
Springer
15 years 6 months ago
Autonomic machine control: a case study
This paper describes an autonomic machine control system applied to the adaptive control of a modular soldering machine. The particular case concerns the creation of a novel modul...
Christian Dannegger, Dominic A. P. Greenwood
CLIMA
2006
15 years 6 months ago
Belief Updating by Communication Channel
In this paper, we introduce the notion of communication channel into a multiagent system. We formalize the system in term of logic with Belief modality, where each possible world i...
Shingo Hagiwara, Mikito Kobayashi, Satoshi Tojo