Sciweavers

6555 search results - page 971 / 1311
» Secure attribute-based systems
Sort
View
AGENTS
2001
Springer
15 years 9 months ago
Automated negotiation from declarative contract descriptions
We present and implement an infrastructure for automating the negotiation of business contracts. Underlying our system is a declarative language for both (1) fully-specified, exe...
Daniel M. Reeves, Michael P. Wellman, Benjamin N. ...
AGENTS
2001
Springer
15 years 9 months ago
Agents teaching agents to share meaning
The development of the semantic Web will require agents to use common domain ontologies to facilitate communication of conceptual knowledge. However, the proliferation of domain on...
Andrew B. Williams, Zijian Ren
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 9 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
122
Voted
OOPSLA
2001
Springer
15 years 9 months ago
Jiazzi: New-Age Components for Old-Fashioned Java
We present Jiazzi, a system that enables the construction of largescale binary components in Java. Jiazzi components can be thought of as generalizations of Java packages with add...
Sean McDirmid, Matthew Flatt, Wilson C. Hsieh
195
Voted
OOPSLA
2001
Springer
15 years 9 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder