Sciweavers

5608 search results - page 918 / 1122
» On the Theory of Matchgate Computations
Sort
View
SWS
2004
ACM
15 years 7 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
WMASH
2004
ACM
15 years 7 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
ATAL
2004
Springer
15 years 7 months ago
Experiments on Deliberation Equilibria in Auctions
Auctions are useful mechanisms for allocating items (goods, tasks, resources, etc.) in multiagent systems. The bulk of auction theory assumes that the bidders know their own valua...
Kate Larson, Tuomas Sandholm
CONCUR
2004
Springer
15 years 7 months ago
Probabilistic Event Structures and Domains
Abstract. This paper studies how to adjoin probability to event structures, leading to the model of probabilistic event structures. In their simplest form probabilistic choice is l...
Daniele Varacca, Hagen Völzer, Glynn Winskel
ECAI
2004
Springer
15 years 7 months ago
A Backtracking Strategy for Order-Independent Incremental Learning
Agents that exist in an environment that changes over time, and are able to take into account the temporal nature of experience, are commonly called incremental learners. It is wid...
Nicola Di Mauro, Floriana Esposito, Stefano Ferill...