Sciweavers

669 search results - page 38 / 134
» critical 2005
Sort
View
POPL
2005
ACM
15 years 5 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
SAC
2005
ACM
15 years 5 months ago
Adaptation point analysis for computation migration/checkpointing
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines t...
Yanqing Ji, Hai Jiang, Vipin Chaudhary
ACII
2005
Springer
15 years 5 months ago
Affective Composites: Autonomy and Proxy in Pedagogical Agent Networks
This paper proposes an alternative paradigm for building affective competencies in embodied conversational agents (ECAs). The key feature of this approach -- and the reason for ref...
Eric R. Hamilton
AIIA
2005
Springer
15 years 5 months ago
A Semantic Kernel to Exploit Linguistic Knowledge
Abstract. Improving accuracy in Information Retrieval tasks via semantic information is a complex problem characterized by three main aspects: the document representation model, th...
Roberto Basili, Marco Cammisa, Alessandro Moschitt...
APWEB
2005
Springer
15 years 5 months ago
Q-GSM: QoS Oriented Grid Service Management
Effective and efficient Quality of Service (QoS) management is critical for a service grid to meet the requirements of both grid users and service providers. We introduce Q-GSM, a ...
Hanhua Chen, Hai Jin, Feng Mao, Hao Wu