Sciweavers

2663 search results - page 169 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
77
Voted
EDOC
2004
IEEE
15 years 2 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
61
Voted
AOSD
2003
ACM
15 years 3 months ago
Model-view-controller and object teams: a perfect match of paradigms
From the early days of object-oriented programming, the model-view-controller paradigm has been pursued for a clear design which separates different responsibilities within an in...
Matthias Veit, Stephan Herrmann
81
Voted
ASIACRYPT
2000
Springer
15 years 2 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas
101
Voted
TMC
2012
13 years 20 days ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
CHI
2008
ACM
15 years 10 months ago
Results from deploying a participation incentive mechanism within the enterprise
Success and sustainability of social networking sites is highly dependent on user participation. To encourage contribution to an opt-in social networking site designed for employe...
Rosta Farzan, Joan Morris DiMicco, David R. Millen...