Sciweavers

620 search results - page 63 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ATAL
2007
Springer
15 years 4 months ago
On the Behavior of Competing Markets Populated by Automated Traders
Abstract. Real market institutions, stock and commodity exchanges for example, do not occur in isolation. Company stock is frequently listed on several stock exchanges, allowing tr...
Jinzhong Niu, Kai Cai, Simon Parsons, Elizabeth Sk...
DNIS
2007
Springer
103views Database» more  DNIS 2007»
15 years 4 months ago
A Formalism for Navigating and Editing XML Document Structure
The use of XML has become pervasive. It is used in a range of data storage and data exchange applications. In many cases such XML data is captured from users via forms or transform...
Frithjof Dau, Mark Sifer
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
CSFW
2005
IEEE
15 years 3 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
ATAL
2005
Springer
15 years 3 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh