Sciweavers

10899 search results - page 2142 / 2180
» Wide Area Computation
Sort
View
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 6 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
ICCAD
1999
IEEE
92views Hardware» more  ICCAD 1999»
15 years 6 months ago
Interface and cache power exploration for core-based embedded system design
Minimizing power consumption is of paramount importance during the design of embedded (mobile computing) systems that come as systems-ona-chip, since interdependencies of design c...
Tony Givargis, Jörg Henkel, Frank Vahid
ELPUB
1998
ACM
15 years 6 months ago
Issues in Electronic Publishing on the Medieval Slavic and Byzantine World
This paper presents the experience gained in work on two current Bulgarian projects aiming at the development of electronic resources for South-East European Studies, Slavic studi...
Milena Dobreva, Serguey Ivanov
99
Voted
AUSAI
1998
Springer
15 years 6 months ago
A Formal Embedding of AgentSpeak(L) in 3APL
Agent-based computing in Arti cial Intelligence has given rise to a number of diverse and competing proposals for agent programming languages. Agents, in the sense we are using it...
Koen V. Hindriks, Frank S. de Boer, Wiebe van der ...
« Prev « First page 2142 / 2180 Last » Next »