Sciweavers

2335 search results - page 333 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
VLDB
2007
ACM
89views Database» more  VLDB 2007»
15 years 8 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
PODC
2004
ACM
15 years 7 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
ATAL
2008
Springer
15 years 3 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
WWW
2003
ACM
16 years 2 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
SAB
2004
Springer
198views Optimization» more  SAB 2004»
15 years 7 months ago
A Review of Probabilistic Macroscopic Models for Swarm Robotic Systems
Abstract. In this paper, we review methods used for macroscopic modeling and analyzing collective behavior of swarm robotic systems. Although the behavior of an individual robot in...
Kristina Lerman, Alcherio Martinoli, Aram Galstyan