Sciweavers

3729 search results - page 63 / 746
» On Formal Modeling of Agent Computations
Sort
View
PERVASIVE
2005
Springer
15 years 5 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
AINA
2004
IEEE
15 years 3 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
ERSHOV
2006
Springer
15 years 3 months ago
A Formal Model of Data Privacy
Information systems support data privacy by constraining user's access to public views and thereby hiding the non-public underlying data. The privacy problem is to prove that ...
Phiniki Stouppa, Thomas Studer
CCGRID
2001
IEEE
15 years 3 months ago
Performance Evaluation of an Agent-Based Resource Management Infrastructure for Grid Computing
Resource management is an important infrastructure in the grid computing environment. Scalability and adaptability are two key challenges in the implementation of such complex sof...
Junwei Cao, Darren J. Kerbyson, Graham R. Nudd
AMET
1998
Springer
15 years 4 months ago
Evolutionary Computing and Negotiating Agents
Automated negotiation has been of particular interest due to the relevant role that negotiation plays among trading agents. This paper presents two types of agent architecture: Cas...
Noyda Matos, Carles Sierra