Sciweavers

4445 search results - page 735 / 889
» Reflective Authorization Systems
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
154
Voted
ADC
2004
Springer
141views Database» more  ADC 2004»
15 years 8 months ago
Conflict Scheduling of Transactions on XML Documents
In the last few years an interest in native XML databases has surfaced. With other authors we argue that such databases need their own provisions for concurrency control since tra...
Stijn Dekeyser, Jan Hidders
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
15 years 8 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
169
Voted
C5
2004
IEEE
15 years 8 months ago
Enabling Social Dimensions of Learning through a Persistent, Unified, Massively Multi-User, and Self-Organizing Virtual Environm
Existing online learning experiences lack the social dimension that characterizes learning in the real world. This social dimension extends beyond the traditional classroom into t...
Julian Lombardi, Mark P. McCahill
156
Voted
ATAL
2006
Springer
15 years 8 months ago
False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation
This paper develops a new combinatorial auction protocol called the Groves Mechanism with SubModular Approximation (GM-SMA). This protocol satisfies the following characteristics:...
Makoto Yokoo, Toshihiro Matsutani, Atsushi Iwasaki