Sciweavers

7329 search results - page 1361 / 1466
» Network Extractor Protocols
Sort
View
146
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
197
Voted
LBM
2007
15 years 5 months ago
Decentralised Clinical Guidelines Modelling with Lightweight Coordination Calculus
Background: Clinical protocols and guidelines have been considered as a major means to ensure that cost-effective services are provided at the point of care. Recently, the comput...
Bo Hu, Srinandan Dasmahapatra, David Robertson, Pa...
148
Voted
DAGSTUHL
2006
15 years 5 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
160
Voted
EON
2003
15 years 5 months ago
Racer: A Core Inference Engine for the Semantic Web
In this paper we describe Racer, which can be considered as a core inference engine for the semantic web. The Racer inference server offers two APIs that are already used by at le...
Volker Haarslev, Ralf Möller
128
Voted
ENTCS
2006
117views more  ENTCS 2006»
15 years 3 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
« Prev « First page 1361 / 1466 Last » Next »