Sciweavers

2335 search results - page 337 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
IEEEARES
2008
IEEE
15 years 8 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 7 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
RAS
2006
81views more  RAS 2006»
15 years 1 months ago
Experiments in multirobot coordination
Consequent to previously published theoretical work by Marshall, Broucke, and Francis, this paper summarizes the apparatus and results of multirobot coordination experiments condu...
Joshua A. Marshall, Terence Fung, Mireille E. Brou...
APLAS
2009
ACM
15 years 8 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
CCR
2005
129views more  CCR 2005»
15 years 1 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft