Sciweavers

115 search results - page 20 / 23
» An Optimal Atomic Broadcast Protocol and an Implementation F...
Sort
View
GECCO
2007
Springer
187views Optimization» more  GECCO 2007»
14 years 2 months ago
Agent-environment interaction in a multi-agent system: a formal model
In this paper, we introduce a formal-language model for explicitly formalizing agent-environment interaction in a multiagent systems (MAS) framework: Conversational Grammar System...
Gemma Bel Enguix, Maria Dolores Jiménez-L&o...
CCS
2009
ACM
14 years 9 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SIGMOD
2006
ACM
113views Database» more  SIGMOD 2006»
14 years 8 months ago
XPORT: extensible profile-driven overlay routing trees
XPORT is a profile-driven distributed data dissemination system that supports an extensible set of data types, profiles types, and optimization metrics. XPORT efficiently implemen...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
TPDS
2010
93views more  TPDS 2010»
13 years 7 months ago
Self-Consistent MPI Performance Guidelines
Message passing using the Message Passing Interface (MPI) is at present the most widely adopted framework for programming parallel applications for distributed-memory and clustere...
Jesper Larsson Träff, William D. Gropp, Rajee...
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 3 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider