Sciweavers

620 search results - page 37 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
AI
2005
Springer
14 years 9 months ago
A theoretical framework on proactive information exchange in agent teamwork
Proactive information delivery is critical to achieving effective teamwork. However, existing theories do not adequately address proactive information delivery. This paper present...
Xiaocong Fan, John Yen, Richard A. Volz
INFOCOM
2009
IEEE
15 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 8 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ECTEL
2007
Springer
15 years 4 months ago
The Everlasting Dawn of Educational Brokers - A Search for Key Design Principles
In the last couple of years we have evidenced several initiatives promoting the vision of open educational systems. Educational brokers are supposed to take advantage of this ‘in...
Bernd Simon, Petra Oberhumer, Robert Kristöfl
ISPE
2003
14 years 11 months ago
PLIB ontology for B2B electronic commerce
: Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide We...
Youcef Aklouf, Guy Pierra, Yamine Aït Ameur, ...