Sciweavers

273 search results - page 33 / 55
» Mutually Independent Commitments
Sort
View
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
15 years 2 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
84
Voted
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
15 years 9 months ago
Data Modelling versus Ontology Engineering
Ontologies in current computer science parlance are computer based resources that represent agreed domain semantics. Unlike data models, the fundamental asset of ontologies is the...
Peter Spyns, Robert Meersman, Mustafa Jarrar
88
Voted
PPOPP
2010
ACM
15 years 7 months ago
Leveraging parallel nesting in transactional memory
Exploiting the emerging reality of affordable multi-core architeces through providing programmers with simple abstractions that would enable them to easily turn their sequential p...
João Barreto, Aleksandar Dragojevic, Paulo ...
ATAL
2007
Springer
15 years 3 months ago
The LOGIC negotiation model
Successful negotiators prepare by determining their position along five dimensions: Legitimacy, Options, Goals, Independence, and Commitment, (LOGIC). We introduce a negotiation ...
Carles Sierra, John K. Debenham
80
Voted
OTM
2007
Springer
15 years 3 months ago
Hawkeye: A Practical Large Scale Demonstration of Semantic Web Integration
Abstract. We discuss our DLDB knowledge base system and evaluate its capability in processing a very large set of real-world Semantic Web data. Using DLDB, we have constructed the ...
Zhengxiang Pan, Abir Qasem, Sudhan Kanitkar, Fabia...