Sciweavers

1080 search results - page 179 / 216
» Protocol Based Communication for Situated Multi-Agent System...
Sort
View
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 4 months ago
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilitie...
Christopher P. Furner, Joey F. George
AOSD
2006
ACM
15 years 3 months ago
Expressing different conceptual models of join point selections in aspect-oriented design
When specifying pointcuts, i.e. join point selections, in AspectOriented Software Development, developers have in different situations different conceptual models in mind. Aspect-...
Dominik Stein, Stefan Hanenberg, Rainer Unland
COOPIS
2002
IEEE
15 years 2 months ago
A Decentralized Algorithm for Coordinating Independent Peers: An Initial Examination
Abstract. Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attrac...
Girish Suryanarayana, Richard N. Taylor
EURONGI
2006
Springer
15 years 1 months ago
Randomized Self-stabilizing Algorithms for Wireless Sensor Networks
Wireless sensor networks (WSNs) pose challenges not present in classical distributed systems: resource limitations, high failure rates, and ad hoc deployment. The lossy nature of w...
Volker Turau, Christoph Weyer
DBSEC
2008
196views Database» more  DBSEC 2008»
14 years 11 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay