Sciweavers

813 search results - page 122 / 163
» On the interaction between sharing and linearity
Sort
View
ICDCS
1996
IEEE
15 years 3 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
ARGMAS
2006
Springer
15 years 3 months ago
Arguments and Counterexamples in Case-Based Joint Deliberation
Multiagent learning can be seen as applying ML techniques to the core issues of multiagent systems, like communication, coordination, and competition. In this paper, we address the...
Santiago Ontañón, Enric Plaza
CSFW
2004
IEEE
15 years 3 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
ECTEL
2006
Springer
15 years 3 months ago
Interoperability for Peer-to-Peer Networks: Opening P2P to the Rest of the World
Due to the information growth, distributed environments are offered as a feasible and scalable solution where Peerto-Peer networks have become more relevant. They bring many advan...
Ingo Brunkhorst, Daniel Olmedilla
CSCW
2008
ACM
15 years 1 months ago
Flashlight jigsaw: an exploratory study of an ad-hoc multi-player game on public displays
As large displays become prevalent in public spaces, they could be employed to create novel game experiences for the public. We present an exploratory study of an ad-hoc multiplay...
Xiang Cao, Michael Massimi, Ravin Balakrishnan