Sciweavers

1567 search results - page 169 / 314
» On Cooperation in a Multi-Entity Model
Sort
View
ATC
2007
Springer
15 years 6 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
188
Voted
ECAL
2007
Springer
15 years 6 months ago
Simulation of the Evolution of Aging: Effects of Aggression and Kin-Recognition
Current biological theory has no commonly accepted view on the phenomenon of aging. On the one hand it is considered as an inescapable degradation immanent to complex biological sy...
Svetlana Krivenko, Mikhail S. Burtsev
180
Voted
HOLOMAS
2007
Springer
15 years 6 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
ICIC
2007
Springer
15 years 6 months ago
Evolutionary Ensemble for In Silico Prediction of Ames Test Mutagenicity
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...
Huanhuan Chen, Xin Yao
137
Voted
ACOM
2006
Springer
15 years 6 months ago
Flexible Conversations Using Social Commitments and a Performatives Hierarchy
In this research, we re-arrange FIPA’s ACL performatives to form a subsumption lattice (ontology) and apply a theory of social commitments to achieve a simplified and observable...
Robert C. Kremer, Roberto A. Flores