Sciweavers

1384 search results - page 240 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ATAL
2003
Springer
15 years 3 months ago
Commitments and causality for multiagent design
This paper unifies two recent strands of research in multiagent system design. One, commitments are widely recognized as capturing important aspects of interactions among agents,...
Feng Wan, Munindar P. Singh
SIGECOM
2010
ACM
135views ECommerce» more  SIGECOM 2010»
14 years 8 months ago
Cooperation in anonymous dynamic social networks
We study the emergence of cooperation in dynamic, anonymous social networks, such as in online communities. We examine prisoner’s dilemma played under a social matching protocol...
Nicole Immorlica, Brendan Lucier, Brian Rogers
IDA
2005
Springer
15 years 3 months ago
Bayesian Networks Learning for Gene Expression Datasets
DNA arrays yield a global view of gene expression and can be used to build genetic networks models, in order to study relations between genes. Literature proposes Bayesian network ...
Giacomo Gamberoni, Evelina Lamma, Fabrizio Riguzzi...
FMCO
2004
Springer
123views Formal Methods» more  FMCO 2004»
15 years 1 months ago
rCOS: Refinement of Component and Object Systems
Abstract. We present a model of object-oriented and component-based refinement. For object-orientation, the model is class-based and refinement is about correct changes in the stru...
Zhiming Liu, Jifeng He, Xiaoshan Li