Sciweavers

182 search results - page 31 / 37
» Towards deployment-time dynamic analysis of server applicati...
Sort
View
72
Voted
PLDI
2005
ACM
15 years 4 months ago
Path slicing
We present a new technique, path slicing, that takes as input a possibly infeasible path to a target location, and eliminates all the operations that are irrelevant towards the re...
Ranjit Jhala, Rupak Majumdar
AAMAS
2007
Springer
14 years 11 months ago
A formal framework for connective stability of highly decentralized cooperative negotiations
Abstract. Multiagent cooperative negotiation is a promising technique for modeling and controlling complex systems. Effective and flexible cooperative negotiations are especially...
Francesco Amigoni, Nicola Gatti
MM
2004
ACM
191views Multimedia» more  MM 2004»
15 years 4 months ago
SwarmArt: interactive art from swarm intelligence
This paper describes SwarmArt, a collaborative project between computer science and art, which resulted in two installations of interactive art that incorporates swarm intelligenc...
Jeffrey E. Boyd, Gerald Hushlak, Christian Jacob
80
Voted
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 5 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IEEEIAS
2009
IEEE
14 years 8 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian