Sciweavers

759 search results - page 114 / 152
» On formal models for social verification
Sort
View
EUROCRYPT
2000
Springer
15 years 1 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
ATAL
2010
Springer
14 years 10 months ago
Verifying agents with memory is harder than it seemed
ATL+ is a variant of alternating-time temporal logic that does not have the expressive power of full ATL , but still allows for expressing some natural properties of agents. It ha...
Nils Bulling, Wojciech Jamroga
CHI
2005
ACM
15 years 10 months ago
Shared landmarks in complex coordination environments
We explore the concept of social landmarks in complex, shared information and coordination environments. Previous research in navigation and shared spaces has tended to emphasize ...
Michael J. Muller, Olga Kuchinskaya, Suzanne O. Mi...
CSCW
2011
ACM
14 years 4 months ago
Scheduling in variable-core collaborative systems
The performance of a collaborative system depends on how two mandatory collaborative tasks, processing and transmission of user commands, are scheduled. We have developed multiple...
Sasa Junuzovic, Prasun Dewan
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
14 years 10 months ago
Convergence analysis of quantum-inspired genetic algorithms with the population of a single individual
In this paper, the Quantum-inspired Genetic Algorithms with the population of a single individual are formalized by a Markov chain model using a single and the stored best individ...
Mehrshad Khosraviani, Saadat Pour-Mozafari, Mohamm...